Lucene search

K
githubGitHub Advisory DatabaseGHSA-JX7X-RF3F-J644
HistoryOct 25, 2023 - 6:32 p.m.

Jenkins CloudBees CD Plugin vulnerable to arbitrary file deletion

2023-10-2518:32:25
CWE-22
CWE-59
GitHub Advisory Database
github.com
9
jenkins
cloudbees cd
plugin
arbitrary file deletion
vulnerable
symbolic links
attackers
file system

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

8.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.1%

In Jenkins CloudBees CD Plugin, artifacts that were previously copied from an agent to the controller are deleted after publishing by the ‘CloudBees CD - Publish Artifact’ post-build step.

CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during this cleanup process.

This allows attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system.

CloudBees CD Plugin 1.1.33 deletes symbolic links without following them.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchelectricflow

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

8.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.1%

Related for GHSA-JX7X-RF3F-J644