Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-32981
HistoryMay 16, 2023 - 4:15 p.m.

Arbitrary file deletion

2023-05-1616:15:00
PRIOn knowledge base
www.prio-n.com
7
jenkins
pipeline utility steps
vulnerability
file deletion
attacker
crafted archives
agent file system
attacker-specified content

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.0%

An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.

CPENameOperatorVersion
pipeline_utility_stepsle2.15.2

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.0%