CVE-2021-43578 – org.jenkins-ci.plugins:squashtm-publisher-plugin
Package
Manager: maven
Name: org.jenkins-ci.plugins:squashtm-publisher-plugin
Vulnerable Version: >=0 <=1.0.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0028 pctl0.51005
Details
Agent-to-controller security bypass in Jenkins Squash TM Publisher (Squash4Jenkins) Plugin allows writing arbitrary files Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string.
Metadata
Created: 2022-05-24T19:20:32Z
Modified: 2023-10-27T16:05:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-h648-gj34-5x4r/GHSA-h648-gj34-5x4r.json
CWE IDs: ["CWE-693"]
Alternative ID: GHSA-h648-gj34-5x4r
Finding: F115
Auto approve: 1