Lucene search

K
githubGitHub Advisory DatabaseGHSA-9GGW-H9MF-4JH7
HistoryOct 25, 2023 - 6:32 p.m.

Jenkins CloudBees CD Plugin vulnerable to arbitrary file read

2023-10-2518:32:25
CWE-22
CWE-59
GitHub Advisory Database
github.com
6
jenkins
cloudbees cd
plugin
vulnerability
arbitrary file read
software
security

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.0005 Low

EPSS

Percentile

18.3%

Jenkins CloudBees CD Plugin temporarily copies files from an agent workspace to the controller in preparation for publishing them in the ‘CloudBees CD - Publish Artifact’ post-build step.

CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the temporary directory on the controller when collecting the list of files to publish.

This allows attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server.

CloudBees CD Plugin 1.1.33 ensures that only files located within the expected directory are published.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchelectricflow

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.0005 Low

EPSS

Percentile

18.3%

Related for GHSA-9GGW-H9MF-4JH7