First published: Wed Mar 08 2023(Updated: )
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
<2.375.4 | ||
<2.394 | ||
Jenkins Jenkins | <2.375.4 | |
Jenkins Jenkins | <2.394 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.388<2.394 | 2.394 |
maven/org.jenkins-ci.main:jenkins-core | >=2.376<2.387.1 | 2.387.1 |
maven/org.jenkins-ci.main:jenkins-core | <2.375.4 | 2.375.4 |
redhat/Jenkins | <2.394 | 2.394 |
redhat/LTS | <2.375.4 | 2.375.4 |
redhat/LTS | <2.387.1 | 2.387.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-27903.
The severity rating of CVE-2023-27903 is medium with a value of 4.4.
An attacker with access to the Jenkins controller file system can exploit CVE-2023-27903 by reading temporary files created with default permissions.
To fix CVE-2023-27903, update Jenkins to version 2.394 or later, or LTS to version 2.375.4 or later.
You can find more information about CVE-2023-27903 in the Jenkins security advisory at https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3058 and the Red Hat Security Advisory at https://access.redhat.com/errata/RHSA-2023:1655.