{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-32981","assignerOrgId":"39769cd5-e6e2-4dc8-927e-97b3aa056f5b","state":"PUBLISHED","assignerShortName":"jenkins","dateReserved":"2023-05-16T10:55:43.518Z","datePublished":"2023-05-16T16:00:03.102Z","dateUpdated":"2025-01-23T20:48:15.205Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Jenkins Pipeline Utility Steps Plugin","vendor":"Jenkins Project","versions":[{"lessThanOrEqual":"2.15.2","status":"affected","version":"0","versionType":"maven"}]}],"descriptions":[{"lang":"en","value":"An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content."}],"providerMetadata":{"orgId":"39769cd5-e6e2-4dc8-927e-97b3aa056f5b","shortName":"jenkins","dateUpdated":"2023-10-24T12:50:01.412Z"},"references":[{"name":"Jenkins Security Advisory 2023-05-16","tags":["vendor-advisory"],"url":"https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T15:32:46.622Z"},"title":"CVE Program Container","references":[{"name":"Jenkins Security Advisory 2023-05-16","tags":["vendor-advisory","x_transferred"],"url":"https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-787","lang":"en","description":"CWE-787 Out-of-bounds Write"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-01-23T20:48:10.287301Z","id":"CVE-2023-32981","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-23T20:48:15.205Z"}}]}}