GHSA-46f2-x6h2-x9hx

Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-46f2-x6h2-x9hx/GHSA-46f2-x6h2-x9hx.json
Aliases
  • CVE-2023-32986
Published
2023-05-16T18:30:16Z
Modified
2023-05-25T17:05:15.031760Z
Details

Jenkins File Parameter Plugin 285.v757c5b67ac25 and earlier does not restrict the name (and resulting uploaded file name) of Stashed File Parameters.

This allows attackers with Item/Configure permission to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

File Parameter Plugin 285.287.v4b7b29d3469d restricts the name (and resulting uploaded file name) of Stashed File Parameters.

References

Affected packages

Maven / io.jenkins.plugins:file-parameters

io.jenkins.plugins:file-parameters

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0
Fixed
285.287.v4b

Affected versions

110.*

110.vbe06c86f5235

146.*

146.v7d35212829d0

191.*

191.v35851c9e7a_5a_

205.*

205.vf6ce13b_e5dee

264.*

264.v1733d9b_2a_380

285.*

285.v757c5b_67a_c25

89.*

89.376eab01f493

90.*

90.71fea1303c13

91.*

91.096d3d7d175c

92.*

92.9c5d5a9ffc54

93.*

93.6ebaad75ae3b

99.*

99.102.vbc6a133bcbbb
99.fec41d2457a7