CVE-2023-32986

8.8 HIGH

📋 TL;DR

The Jenkins File Parameter Plugin vulnerability allows attackers with Item/Configure permission to write arbitrary files with attacker-controlled content to the Jenkins controller file system. This affects Jenkins instances using the File Parameter Plugin version 285.v757c5b_67a_c25 and earlier. Attackers can potentially overwrite critical system files or deploy malicious payloads.

💻 Affected Systems

Products:
  • Jenkins File Parameter Plugin
Versions: 285.v757c5b_67a_c25 and earlier
Operating Systems: All platforms running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Item/Configure permission on affected Jenkins items. Jenkins controllers with the vulnerable plugin installed are affected regardless of OS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Jenkins controller leading to remote code execution, data theft, or lateral movement within the network.

🟠

Likely Case

Unauthorized file creation/modification leading to privilege escalation, persistence mechanisms, or disruption of Jenkins operations.

🟢

If Mitigated

Limited impact if proper access controls and file system permissions restrict write access to sensitive directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Item/Configure permission. The vulnerability is straightforward to exploit once authenticated with appropriate permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 286.v0a_526a_b_78127 and later

Vendor Advisory: https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3123

Restart Required: Yes

Instructions:

1. Update Jenkins File Parameter Plugin to version 286.v0a_526a_b_78127 or later via Jenkins Plugin Manager. 2. Restart Jenkins controller after plugin update.

🔧 Temporary Workarounds

Remove File Parameter Plugin

all

Uninstall the vulnerable plugin if not required for operations

Manage Jenkins > Manage Plugins > Installed > File Parameter Plugin > Uninstall

Restrict Item/Configure Permissions

all

Limit users with Item/Configure permission to trusted administrators only

Manage Jenkins > Manage and Assign Roles > Configure Global Security > Project-based Matrix Authorization Strategy

🧯 If You Can't Patch

  • Implement strict access controls to limit users with Item/Configure permission
  • Monitor file system changes on Jenkins controller for unauthorized file writes

🔍 How to Verify

Check if Vulnerable:

Check installed plugin version via Manage Jenkins > Manage Plugins > Installed > File Parameter Plugin

Check Version:

Check Jenkins web interface or plugin directory for file-parameters.jpi version

Verify Fix Applied:

Verify plugin version is 286.v0a_526a_b_78127 or later in plugin manager

📡 Detection & Monitoring

Log Indicators:

  • Unusual file parameter uploads
  • File system writes to unexpected locations
  • Jenkins audit logs showing Item/Configure actions

Network Indicators:

  • HTTP POST requests to file parameter endpoints with unusual file names

SIEM Query:

source="jenkins" AND (event_type="file_upload" OR action="configure") AND file_name CONTAINS path_traversal_patterns

🔗 References

📤 Share & Export