Description
An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
Remediation
References
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196
Related Vulnerabilities
CVE-2021-22135 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2019-10249 Vulnerability in maven package org.eclipse.xtext:org.eclipse.xtext.maven.parent
CVE-2020-36732 Vulnerability in maven package org.webjars.npm:crypto-js
CVE-2023-33265 Vulnerability in maven package com.hazelcast:hazelcast
CVE-2020-13941 Vulnerability in maven package org.apache.solr:solr-core