← Volver a CVEs
CVE-2023-43497
HIGH8.1
Descripcion
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
Detalles CVE
Puntuacion CVSS v3.18.1
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado9/20/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
jenkins:jenkins
Debilidades (CWE)
CWE-434
Referencias
http://www.openwall.com/lists/oss-security/2023/09/20/5(jenkinsci-cert@googlegroups.com)
https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2023/09/20/5(af854a3a-2127-422b-91ae-364da2661108)
https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.