Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-43498

Опубликовано: 20 сент. 2023
Источник: redhat
CVSS3: 3.6
EPSS Низкий

Описание

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

A flaw was found in Jenkins weekly and LTS due to an issue when processing file uploads using the MultipartFormDataParser. By sending a specially crafted request, a local authenticated attacker could bypass security restrictions and access the Jenkins controller file system to read and write the files before they are used.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and ServicesjenkinsAffected
Red Hat OpenShift Container Platform 3.11jenkinsOut of support scope
Red Hat OpenShift Container Platform 4jenkinsAffected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-378
https://bugzilla.redhat.com/show_bug.cgi?id=2240096jenkins: API MultipartFormDataParser temporary uploaded file created with insecure permissions

EPSS

Процентиль: 29%
0.00104
Низкий

3.6 Low

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
почти 2 года назад

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

CVSS3: 8.1
debian
почти 2 года назад

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file ...

CVSS3: 3.6
github
почти 2 года назад

Jenkins temporary uploaded file created with insecure permissions

CVSS3: 8.1
fstec
почти 2 года назад

Уязвимость сервера автоматизации Jenkins, связанная с созданием временных файлов с небезопасными разрешениями, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов

CVSS3: 8.8
redos
около 1 года назад

Множественные уязвимости jenkins

EPSS

Процентиль: 29%
0.00104
Низкий

3.6 Low

CVSS3