An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Jan 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-01-23T20:48:15.205Z
Reserved: 2023-05-16T10:55:43.518Z
Link: CVE-2023-32981

Updated: 2024-08-02T15:32:46.622Z

Status : Modified
Published: 2023-05-16T16:15:10.833
Modified: 2025-01-23T21:15:11.753
Link: CVE-2023-32981
