logo

CVE-2022-36890 org.jenkins-ci.plugins:deployer-framework

Package

Manager: maven
Name: org.jenkins-ci.plugins:deployer-framework
Vulnerable Version: >=0 <86.v7b_a_4a_55b_f3ec

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00661 pctl0.70264

Details

Jenkins Deployer Framework Plugin vulnerable to Path Traversal Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the name of files in methods implementing form validation. This allows attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. Deployer Framework Plugin 86.v7b_a_4a_55b_f3ec ensures that only files contained inside the expected directory can be accessed.

Metadata

Created: 2022-07-28T00:00:42Z
Modified: 2023-10-27T20:40:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-hgp9-2c4w-x9mh/GHSA-hgp9-2c4w-x9mh.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-hgp9-2c4w-x9mh
Finding: F063
Auto approve: 1