Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the directory from which artifacts are published during the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2710 | Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the directory from which artifacts are published during the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server. |
Github GHSA |
GHSA-9ggw-h9mf-4jh7 | Jenkins CloudBees CD Plugin vulnerable to arbitrary file read |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-13T17:14:28.562Z
Reserved: 2023-10-24T16:05:00.959Z
Link: CVE-2023-46655
Updated: 2024-08-02T20:53:21.823Z
Status : Modified
Published: 2023-10-25T18:17:40.173
Modified: 2024-11-21T08:28:59.400
Link: CVE-2023-46655
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA