logo

CVE-2023-46654 org.jenkins-ci.plugins:electricflow

Package

Manager: maven
Name: org.jenkins-ci.plugins:electricflow
Vulnerable Version: >=0 <1.1.33

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00089 pctl0.26319

Details

Jenkins CloudBees CD Plugin vulnerable to arbitrary file deletion In Jenkins CloudBees CD Plugin, artifacts that were previously copied from an agent to the controller are deleted after publishing by the 'CloudBees CD - Publish Artifact' post-build step. CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during this cleanup process. This allows attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system. CloudBees CD Plugin 1.1.33 deletes symbolic links without following them.

Metadata

Created: 2023-10-25T18:32:25Z
Modified: 2023-11-02T16:49:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-jx7x-rf3f-j644/GHSA-jx7x-rf3f-j644.json
CWE IDs: ["CWE-22", "CWE-59"]
Alternative ID: GHSA-jx7x-rf3f-j644
Finding: F063
Auto approve: 1