### [CVE-2023-27903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27903) ![](https://img.shields.io/static/v1?label=Product&message=Jenkins&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon