CVE-2023-43496

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*

History

21 Nov 2024, 08:24

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/09/20/5 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2023/09/20/5 - Mailing List, Third Party Advisory
References () https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3072 - Vendor Advisory () https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3072 - Vendor Advisory

Information

Published : 2023-09-20 17:15

Updated : 2025-05-02 16:15


NVD link : CVE-2023-43496

Mitre link : CVE-2023-43496

CVE.ORG link : CVE-2023-43496


JSON object : View

Products Affected

jenkins

  • jenkins
CWE
CWE-276

Incorrect Default Permissions