CVE-2023-46654

Severity
8.1HIGH
EPSS
0.1%
top 69.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 25

Description

Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during the cleanup process of the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 2.8 | Impact: 5.2

Affected Packages3 packages

🔴Vulnerability Details

3
OSV
Jenkins CloudBees CD Plugin vulnerable to arbitrary file deletion2023-10-25
CVEList
CVE-2023-46654: Jenkins CloudBees CD Plugin 12023-10-25
GHSA
Jenkins CloudBees CD Plugin vulnerable to arbitrary file deletion2023-10-25

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2023-10-252023-10-25
CVE-2023-46654 (HIGH CVSS 8.1) | Jenkins CloudBees CD Plugin 1.1.32 | cvebase.io