Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-55wp-3pq4-w8p9

Опубликовано: 20 сент. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7

Описание

Jenkins temporary plugin file created with insecure permissions

Jenkins creates a temporary file when a plugin is deployed directly from a URL.

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates this temporary file in the system temporary directory with the default permissions for newly created files.

If these permissions are overly permissive, they may allow attackers with access to the Jenkins controller file system to read and write the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.

This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.

This issue complements SECURITY-2823, which affected plugins uploaded from an administrator’s computer. Jenkins 2.424, LTS 2.414.2 creates the temporary file in a subdirectory with more restrictive permissions.

As a workaround, you can change your default temporary-file directory using the Java system property java.io.tmpdir, if you’re concerned about this issue but unable to immediately update Jenkins.

Пакеты

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

>= 2.50, < 2.414.2

2.414.2

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

>= 2.415, < 2.424

2.424

EPSS

Процентиль: 35%
0.00141
Низкий

7 High

CVSS3

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 7
redhat
почти 2 года назад

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.

CVSS3: 8.8
nvd
почти 2 года назад

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.

CVSS3: 8.8
debian
почти 2 года назад

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary ...

CVSS3: 7
fstec
почти 2 года назад

Уязвимость сервера автоматизации Jenkins, связанная с недостатками разграничения доступа, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов и выполнить произвольный код

CVSS3: 8.8
redos
около 1 года назад

Множественные уязвимости jenkins

EPSS

Процентиль: 35%
0.00141
Низкий

7 High

CVSS3

Дефекты

CWE-276