Description
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
Remediation
References
http://www.openwall.com/lists/oss-security/2023/09/20/5
https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073
Related Vulnerabilities
CVE-2020-2150 Vulnerability in maven package org.jenkins-ci.plugins:quality-gates
CVE-2019-10346 Vulnerability in maven package org.jenkins-ci.plugins:embeddable-build-status
CVE-2020-8910 Vulnerability in maven package org.webjars.npm:google-closure-library
CVE-2022-41965 Vulnerability in maven package org.opencastproject:opencast-engage-paella-player
CVE-2020-24855 Vulnerability in npm package @easy-team/easywebpack-cli