First published: Wed Jul 27 2022(Updated: )
Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the name of files in methods implementing form validation, allowing attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Deployer Framework | <=85.v1d1888e8c021 | |
maven/org.jenkins-ci.plugins:deployer-framework | <=85.v1d1888e8c021 | 86.v7b_a_4a_55b_f3ec |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36890 has been rated as a medium severity vulnerability.
To fix CVE-2022-36890, upgrade the Jenkins Deployer Framework Plugin to version 86.v7b_a_4a_55b_f3ec or later.
CVE-2022-36890 affects users of Jenkins Deployer Framework Plugin version 85.v1d1888e8c021 and earlier.
The potential risks of CVE-2022-36890 include unauthorized access to file paths on the Jenkins controller file system.
Attackers with Item/Read permission can check the existence of arbitrary file paths on the Jenkins controller file system due to CVE-2022-36890.