Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during the cleanup process of the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2769 Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during the cleanup process of the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system.
Github GHSA Github GHSA GHSA-jx7x-rf3f-j644 Jenkins CloudBees CD Plugin vulnerable to arbitrary file deletion
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-13T17:14:28.053Z

Reserved: 2023-10-24T16:05:00.959Z

Link: CVE-2023-46654

cve-icon Vulnrichment

Updated: 2024-08-02T20:53:21.660Z

cve-icon NVD

Status : Modified

Published: 2023-10-25T18:17:40.130

Modified: 2024-11-21T08:28:59.250

Link: CVE-2023-46654

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.