Loading HuntDB...

CVE-2023-46654

UNKNOWN
Published 2023-10-25T13:45:55.611Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2023-46654. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during the cleanup process of the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

Jenkins CloudBees CD Plugin vulnerable to arbitrary file deletion

GHSA-jx7x-rf3f-j644

Advisory Details

In Jenkins CloudBees CD Plugin, artifacts that were previously copied from an agent to the controller are deleted after publishing by the 'CloudBees CD - Publish Artifact' post-build step. CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during this cleanup process. This allows attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system. CloudBees CD Plugin 1.1.33 deletes symbolic links without following them.

Affected Packages

Maven org.jenkins-ci.plugins:electricflow
ECOSYSTEM: ≥0 <1.1.33

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: October 25, 2023, Modified: November 2, 2023

References

Published: 2023-10-25T13:45:55.611Z
Last Modified: 2025-02-13T17:14:28.053Z
Copied to clipboard!