Description
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
Remediation
References
http://www.openwall.com/lists/oss-security/2023/09/20/5
https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073
Related Vulnerabilities
CVE-2020-28440 Vulnerability in npm package corenlp-js-interface
CVE-2023-33546 Vulnerability in maven package org.codehaus.janino:janino-parent
CVE-2023-33202 Vulnerability in maven package org.bouncycastle:bc-fips-debug
CVE-2018-1000632 Vulnerability in maven package dom4j:dom4j
CVE-2020-28502 Vulnerability in maven package org.webjars.npm:xmlhttprequest