CVE-2023-46654

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-46654
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46654.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-46654
Aliases
Withdrawn
2024-09-03T04:41:27.994378Z
Published
2023-10-25T18:17:40Z
Modified
2024-09-03T04:35:15.911160Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during the cleanup process of the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system.

References

Affected packages

Git / github.com/jenkinsci/electricflow-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/electricflow-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

cloudbees-flow-1.*

cloudbees-flow-1.1.10
cloudbees-flow-1.1.11
cloudbees-flow-1.1.12
cloudbees-flow-1.1.14
cloudbees-flow-1.1.15
cloudbees-flow-1.1.16
cloudbees-flow-1.1.17
cloudbees-flow-1.1.18
cloudbees-flow-1.1.19
cloudbees-flow-1.1.20
cloudbees-flow-1.1.21
cloudbees-flow-1.1.22
cloudbees-flow-1.1.23
cloudbees-flow-1.1.25
cloudbees-flow-1.1.26
cloudbees-flow-1.1.27
cloudbees-flow-1.1.28
cloudbees-flow-1.1.29
cloudbees-flow-1.1.30
cloudbees-flow-1.1.8
cloudbees-flow-1.1.9

electricflow-1.*

electricflow-1.0
electricflow-1.1.1
electricflow-1.1.13
electricflow-1.1.2
electricflow-1.1.24
electricflow-1.1.3
electricflow-1.1.31
electricflow-1.1.32
electricflow-1.1.4
electricflow-1.1.5
electricflow-1.1.6
electricflow-1.1.7