CVSS 3.1 Score 8.1 of 10 (high)


Published Sep 20, 2023
Updated: Sep 23, 2023
CWE ID 434


CVE-2023-43497 is a vulnerability that affects Jenkins versions 2.423 and earlier, as well as LTS versions 2.414.1 and earlier. This vulnerability allows attackers with access to the Jenkins controller file system to read and write files before they are used, by exploiting the default permissions of temporary files created during the processing of file uploads using the Stapler web framework. The vulnerability has a base severity rating of HIGH with a base score of 8.1 according to NVD@NIST's analysis. The exploitability score is 2.8, and the impact score is 5.2. The vulnerability has a low attack complexity and requires low privileges, but it poses a high risk to confidentiality and integrity. To remediate this vulnerability, users should update their Jenkins installations to versions that are not affected by this issue.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-43497 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options