logo

CVE-2021-43578 org.jenkins-ci.plugins:squashtm-publisher-plugin

Package

Manager: maven
Name: org.jenkins-ci.plugins:squashtm-publisher-plugin
Vulnerable Version: >=0 <=1.0.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0028 pctl0.51005

Details

Agent-to-controller security bypass in Jenkins Squash TM Publisher (Squash4Jenkins) Plugin allows writing arbitrary files Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string.

Metadata

Created: 2022-05-24T19:20:32Z
Modified: 2023-10-27T16:05:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-h648-gj34-5x4r/GHSA-h648-gj34-5x4r.json
CWE IDs: ["CWE-693"]
Alternative ID: GHSA-h648-gj34-5x4r
Finding: F115
Auto approve: 1