CVE-2022-36890 – org.jenkins-ci.plugins:deployer-framework
Package
Manager: maven
Name: org.jenkins-ci.plugins:deployer-framework
Vulnerable Version: >=0 <86.v7b_a_4a_55b_f3ec
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00661 pctl0.70264
Details
Jenkins Deployer Framework Plugin vulnerable to Path Traversal Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the name of files in methods implementing form validation. This allows attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. Deployer Framework Plugin 86.v7b_a_4a_55b_f3ec ensures that only files contained inside the expected directory can be accessed.
Metadata
Created: 2022-07-28T00:00:42Z
Modified: 2023-10-27T20:40:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-hgp9-2c4w-x9mh/GHSA-hgp9-2c4w-x9mh.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-hgp9-2c4w-x9mh
Finding: F063
Auto approve: 1