First published: Tue May 16 2023(Updated: )
An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.15.2 | ||
Jenkins Pipeline Utility Steps | <=2.15.2 | |
maven/org.jenkins-ci.plugins:pipeline-utility-steps | <2.15.3 | 2.15.3 |
redhat/Pipeline Utility Steps Plugin | <2.15.3 | 2.15.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32981 is classified as a high severity vulnerability due to the arbitrary file write capability it introduces.
To mitigate CVE-2023-32981, upgrade the Jenkins Pipeline Utility Steps Plugin to version 2.15.3 or later.
Attackers can exploit CVE-2023-32981 to create or overwrite arbitrary files on the Jenkins agent's file system with attacker-specified content.
CVE-2023-32981 affects Jenkins Pipeline Utility Steps Plugin versions 2.15.2 and earlier.
CVE-2023-32981 can be exploited by providing crafted archives as parameters that manipulate file system behavior on Jenkins agents.