Vulnerability Description
A time-of-check-time-of-use race condition vulnerability in Buildkite Elastic CI for AWS versions prior to 6.7.1 and 5.22.5 allows the buildkite-agent user to bypass a symbolic link check for the PIPELINE_PATH variable in the fix-buildkite-agent-builds-permissions script.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Buildkite | Elastic Ci Stack | < 5.22.5 |
Related Weaknesses (CWE)
References
- https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.mdExploitThird Party Advisory
- https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.mdExploitThird Party Advisory
FAQ
What is CVE-2023-43741?
CVE-2023-43741 is a vulnerability with a CVSS score of 7.0 (HIGH). A time-of-check-time-of-use race condition vulnerability in Buildkite Elastic CI for AWS versions prior to 6.7.1 and 5.22.5 allows the buildkite-agent user to bypass a symbolic link check for the PIPE...
How severe is CVE-2023-43741?
CVE-2023-43741 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-43741?
Check the references section above for vendor advisories and patch information. Affected products include: Buildkite Elastic Ci Stack.