Lucene search

K
cvelistJenkinsCVELIST:CVE-2023-43497
HistorySep 20, 2023 - 4:06 p.m.

CVE-2023-43497

2023-09-2016:06:10
jenkins
www.cve.org
2
cve-2023-43497
jenkins
file uploads
stapler web framework
temporary files
system temporary directory
permissions
attackers
jenkins controller
file system

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.4%

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "Jenkins",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThan": "*",
        "status": "unaffected",
        "version": "2.424",
        "versionType": "maven"
      },
      {
        "lessThan": "2.414.*",
        "status": "unaffected",
        "version": "2.414.2",
        "versionType": "maven"
      }
    ]
  }
]

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.4%