CVE-2023-32981 Vulnerability Details
/
/
/
CVE-2023-32981 Metadata Quick Info
CVE Published: 16/05/2023 |
CVE Updated: 02/08/2024 |
CVE Year: 2023
Source: jenkins |
Vendor: Jenkins Project |
Product: Jenkins Pipeline Utility Steps Plugin
Status : PUBLISHED
CVE-2023-32981 Description
An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
Metrics
CVSS Version: 3.1 |
Base Score: n/a
Vector: n/a
l➤ Exploitability Metrics:
Attack Vector (AV)*
Attack Complexity (AC)*
Privileges Required (PR)*
User Interaction (UI)*
Scope (S)*
l➤ Impact Metrics:
Confidentiality Impact (C)*
Integrity Impact (I)*
Availability Impact (A)*
Weakness Enumeration (CWE)
CWE-ID:
CWE Name:
Source: Jenkins Project
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID:
CAPEC Description:
Source: NVD (National Vulnerability Database).