First published: Tue May 16 2023(Updated: )
An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.15.2 | ||
Jenkins Pipeline Utility Steps | <=2.15.2 | |
maven/org.jenkins-ci.plugins:pipeline-utility-steps | <2.15.3 | 2.15.3 |
redhat/Pipeline Utility Steps Plugin | <2.15.3 | 2.15.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.