Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the directory from which artifacts are published during the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2710 Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the directory from which artifacts are published during the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server.
Github GHSA Github GHSA GHSA-9ggw-h9mf-4jh7 Jenkins CloudBees CD Plugin vulnerable to arbitrary file read
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-13T17:14:28.562Z

Reserved: 2023-10-24T16:05:00.959Z

Link: CVE-2023-46655

cve-icon Vulnrichment

Updated: 2024-08-02T20:53:21.823Z

cve-icon NVD

Status : Modified

Published: 2023-10-25T18:17:40.173

Modified: 2024-11-21T08:28:59.400

Link: CVE-2023-46655

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.