CVE-2023-46654 – org.jenkins-ci.plugins:electricflow
Package
Manager: maven
Name: org.jenkins-ci.plugins:electricflow
Vulnerable Version: >=0 <1.1.33
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00089 pctl0.26319
Details
Jenkins CloudBees CD Plugin vulnerable to arbitrary file deletion In Jenkins CloudBees CD Plugin, artifacts that were previously copied from an agent to the controller are deleted after publishing by the 'CloudBees CD - Publish Artifact' post-build step. CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during this cleanup process. This allows attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system. CloudBees CD Plugin 1.1.33 deletes symbolic links without following them.
Metadata
Created: 2023-10-25T18:32:25Z
Modified: 2023-11-02T16:49:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-jx7x-rf3f-j644/GHSA-jx7x-rf3f-j644.json
CWE IDs: ["CWE-22", "CWE-59"]
Alternative ID: GHSA-jx7x-rf3f-j644
Finding: F063
Auto approve: 1