← Voltar para CVEs
CVE-2023-32981
HIGH8.8
Descricao
An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
Detalhes CVE
Pontuacao CVSS v3.18.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado5/16/2023
Ultima modificacao1/23/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
jenkins:pipeline_utility_steps
Fraquezas (CWE)
CWE-787CWE-787
Referencias
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196(jenkinsci-cert@googlegroups.com)
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.