Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-43497

Опубликовано: 20 сент. 2023
Источник: debian
EPSS Низкий

Описание

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jenkinsremovedpackage

EPSS

Процентиль: 21%
0.00066
Низкий

Связанные уязвимости

CVSS3: 3.6
redhat
больше 2 лет назад

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

CVSS3: 8.1
nvd
больше 2 лет назад

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

CVSS3: 3.6
github
больше 2 лет назад

Jenkins temporary uploaded file created with insecure permissions

CVSS3: 8.1
fstec
больше 2 лет назад

Уязвимость сервера автоматизации Jenkins, связанная с неограниченной загрузкой файла опасного типа, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов

CVSS3: 8.8
redos
почти 2 года назад

Множественные уязвимости jenkins

EPSS

Процентиль: 21%
0.00066
Низкий