An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jenkins
Published: 2023-05-16T16:00:03.102Z
Updated: 2023-10-24T12:50:01.412Z
Reserved: 2023-05-16T10:55:43.518Z
Link: CVE-2023-32981
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-05-16T16:15:10.833
Modified: 2023-06-09T18:32:50.573
Link: CVE-2023-32981
JSON object: View
Redhat Information
No data.
CWE