{
  "threat_severity" : "Important",
  "public_date" : "2023-09-20T00:00:00Z",
  "bugzilla" : {
    "description" : "jenkins: Temporary plugin file created with insecure permissions",
    "id" : "2239939",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2239939"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-378",
  "details" : [ "Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.", "A flaw was found in Jenkins weekly and LTS due to an issue creating a temporary file in the system's temporary directory with default permissions. By sending a specially crafted request, a local authenticated attacker could execute arbitrary code on the system." ],
  "package_state" : [ {
    "product_name" : "OpenShift Developer Tools and Services",
    "fix_state" : "Affected",
    "package_name" : "jenkins",
    "cpe" : "cpe:/a:redhat:ocp_tools"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Affected",
    "package_name" : "jenkins",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Affected",
    "package_name" : "jenkins",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-43496\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-43496" ],
  "name" : "CVE-2023-43496",
  "csaw" : false
}