First published: Wed Oct 25 2023(Updated: )
In Jenkins CloudBees CD Plugin, artifacts that were previously copied from an agent to the controller are deleted after publishing by the 'CloudBees CD - Publish Artifact' post-build step. CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during this cleanup process. This allows attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system. CloudBees CD Plugin 1.1.33 deletes symbolic links without following them.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cloudbees Cd | <=1.1.32 | |
maven/org.jenkins-ci.plugins:electricflow | <1.1.33 | 1.1.33 |
<=1.1.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-46654.
The severity of CVE-2023-46654 is high, with a severity value of 8.1.
In Jenkins CloudBees CD Plugin 1.1.32 and earlier, artifacts that were previously copied from an agent to the controller are deleted after publishing by the 'CloudBees CD - Publish Artifact' post-build step.
To fix CVE-2023-46654, you should upgrade CloudBees CD Plugin to version 1.1.33.
The CWE categories for CVE-2023-46654 are CWE-22 and CWE-59.