logo

CVE-2022-41235 org.jenkins-ci.plugins:wildfly-deployer

Package

Manager: maven
Name: org.jenkins-ci.plugins:wildfly-deployer
Vulnerable Version: >=0 <=1.0.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00656 pctl0.70122

Details

Jenkins WildFly Deployer Plugin vulnerable to path traversal Jenkins WildFly Deployer Plugin 1.0.2 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system. This vulnerability is only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.303/#upgrading-to-jenkins-lts-2-303-3).

Metadata

Created: 2022-09-22T00:00:28Z
Modified: 2022-12-09T19:51:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-f7fq-wp2x-jc25/GHSA-f7fq-wp2x-jc25.json
CWE IDs: ["CWE-22", "CWE-284", "CWE-693"]
Alternative ID: GHSA-f7fq-wp2x-jc25
Finding: F063
Auto approve: 1