First published: Wed Jul 27 2022(Updated: )
An arbitrary file write vulnerability in Jenkins CLIF Performance Testing Plugin 64.vc0d66de1dfb_f and earlier allows attackers with Overall/Read permission to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:clif-performance-testing | <=64.vc0d66de1dfb | 71.v0741865e206f |
Jenkins Clif Performance Testing | <=64.vc0d66de1dfb_f | |
<=64.vc0d66de1dfb_f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36894 allows attackers with Overall/Read permission to create or replace arbitrary files on the Jenkins controller file system, posing a significant security risk.
To remediate CVE-2022-36894, update the CLIF Performance Testing Plugin to version 71.v0741865e206f or later.
CVE-2022-36894 affects Jenkins users who have the CLIF Performance Testing Plugin version 64.vc0d66de1dfb or earlier installed.
CVE-2022-36894 is classified as an arbitrary file write vulnerability.
Versions of the CLIF Performance Testing Plugin up to and including 64.vc0d66de1dfb are vulnerable to CVE-2022-36894.