Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qeDd4LXJmM2YtajY0NM4AA2ry

Jenkins CloudBees CD Plugin vulnerable to arbitrary file deletion

In Jenkins CloudBees CD Plugin, artifacts that were previously copied from an agent to the controller are deleted after publishing by the 'CloudBees CD - Publish Artifact' post-build step.

CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during this cleanup process.

This allows attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system.

CloudBees CD Plugin 1.1.33 deletes symbolic links without following them.

Permalink: https://github.com/advisories/GHSA-jx7x-rf3f-j644
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qeDd4LXJmM2YtajY0NM4AA2ry
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 7 months ago
Updated: 6 months ago


CVSS Score: 8.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Identifiers: GHSA-jx7x-rf3f-j644, CVE-2023-46654
References: Repository: https://github.com/jenkinsci/electricflow-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:electricflow
Affected Version Ranges: < 1.1.33
Fixed in: 1.1.33