First published: Wed Oct 25 2023(Updated: )
Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the directory from which artifacts are published during the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cloudbees Cd | <=1.1.32 | |
maven/org.jenkins-ci.plugins:electricflow | <1.1.33 | 1.1.33 |
<=1.1.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-46655 is medium.
Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the temporary directory.
Yes, the remedy for CVE-2023-46655 is to update to version 1.1.33 of CloudBees CD Plugin.
The CWE IDs associated with CVE-2023-46655 are CWE-22 and CWE-59.
More information about CVE-2023-46655 can be found at the following references: [1](http://www.openwall.com/lists/oss-security/2023/10/25/2), [2](https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3238), [3](https://nvd.nist.gov/vuln/detail/CVE-2023-46655).