vulnerability
Red Hat OpenShift: CVE-2023-27899: Jenkins: Temporary plugin file created with insecure permissions
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:M/Au:S/C:C/I:C/A:C) | Mar 10, 2023 | May 10, 2023 | Apr 11, 2025 |
Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
Mar 10, 2023
Added
May 10, 2023
Modified
Apr 11, 2025
Description
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution.
Solution
linuxrpm-upgrade-jenkins

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.