CVE-2023-43497
CVSS 3.1 Score 8.1 of 10 (high)
Details
Summary
CVE-2023-43497 is a vulnerability that affects Jenkins versions 2.423 and earlier, as well as LTS versions 2.414.1 and earlier. This vulnerability allows attackers with access to the Jenkins controller file system to read and write files before they are used, by exploiting the default permissions of temporary files created during the processing of file uploads using the Stapler web framework. The vulnerability has a base severity rating of HIGH with a base score of 8.1 according to NVD@NIST's analysis. The exploitability score is 2.8, and the impact score is 5.2. The vulnerability has a low attack complexity and requires low privileges, but it poses a high risk to confidentiality and integrity. To remediate this vulnerability, users should update their Jenkins installations to versions that are not affected by this issue.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions