CVE-2023-43497

CVSS 3.1 Score 8.1 of 10 (high)

Details

Published Sep 20, 2023
Updated: Sep 23, 2023
CWE ID 434

Summary

CVE-2023-43497 is a vulnerability that affects Jenkins versions 2.423 and earlier, as well as LTS versions 2.414.1 and earlier. This vulnerability allows attackers with access to the Jenkins controller file system to read and write files before they are used, by exploiting the default permissions of temporary files created during the processing of file uploads using the Stapler web framework. The vulnerability has a base severity rating of HIGH with a base score of 8.1 according to NVD@NIST's analysis. The exploitability score is 2.8, and the impact score is 5.2. The vulnerability has a low attack complexity and requires low privileges, but it poses a high risk to confidentiality and integrity. To remediate this vulnerability, users should update their Jenkins installations to versions that are not affected by this issue.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-43497 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions