Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1480 | An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content. |
Github GHSA |
GHSA-6987-xccv-fhjp | Jenkins Pipeline Utility Steps Plugin arbitrary file write vulnerability |
Thu, 23 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-01-23T20:48:15.205Z
Reserved: 2023-05-16T10:55:43.518Z
Link: CVE-2023-32981
Updated: 2024-08-02T15:32:46.622Z
Status : Modified
Published: 2023-05-16T16:15:10.833
Modified: 2025-01-23T21:15:11.753
Link: CVE-2023-32981
OpenCVE Enrichment
No data.
EUVD
Github GHSA