Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/09/20/5 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3072 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jenkins
Published: 2023-09-20T16:06:10.098Z
Updated: 2023-10-24T12:52:02.385Z
Reserved: 2023-09-19T09:22:58.130Z
Link: CVE-2023-43496
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-09-20T17:15:11.820
Modified: 2023-09-23T03:45:08.510
Link: CVE-2023-43496
JSON object: View
Redhat Information
No data.
CWE