First published: Wed Jul 27 2022(Updated: )
A missing permission check in Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier allows attackers with Item/Read permission but without Deploy Now/Deploy permission to read deployment logs.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:deployer-framework | <=85.v1d1888e8c021 | 86.v7b_a_4a_55b_f3ec |
Jenkins Deployer Framework | <=85.v1d1888e8c021 | |
<=85.v1d1888e8c021 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36891 has a medium severity due to the potential exposure of deployment logs to unauthorized users.
To fix CVE-2022-36891, upgrade to Jenkins Deployer Framework Plugin version 86.v7b_a_4a_55b_f3ec or later.
CVE-2022-36891 allows users with Item/Read permission to access deployment logs without having Deploy Now/Deploy permission.
CVE-2022-36891 affects versions up to and including 85.v1d1888e8c021 of the Jenkins Deployer Framework Plugin.
The main issue caused by CVE-2022-36891 is the missing permission check that exposes sensitive deployment logs to unauthorized users.