First published: Wed Jul 27 2022(Updated: )
A missing permission check in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Openshift Deployer | <=1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-36907 is classified as medium due to the potential for unauthorized access to sensitive information.
To fix CVE-2022-36907, upgrade the Jenkins OpenShift Deployer Plugin to version 1.2.1 or later.
Users of Jenkins OpenShift Deployer Plugin version 1.2.0 and earlier are affected by CVE-2022-36907.
The impact of CVE-2022-36907 allows attackers with Overall/Read permission to connect to arbitrary URLs using credentials they specify.
A proper workaround for CVE-2022-36907 is to restrict Overall/Read permissions, limiting access to authorized users only.