An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1480 | An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content. |
Github GHSA |
GHSA-6987-xccv-fhjp | Jenkins Pipeline Utility Steps Plugin arbitrary file write vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 23 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-01-23T20:48:15.205Z
Reserved: 2023-05-16T10:55:43.518Z
Link: CVE-2023-32981
Updated: 2024-08-02T15:32:46.622Z
Status : Modified
Published: 2023-05-16T16:15:10.833
Modified: 2025-01-23T21:15:11.753
Link: CVE-2023-32981
OpenCVE Enrichment
No data.
EUVD
Github GHSA