Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1oZ3A5LTJjNHcteDltaM4AAttI
Jenkins Deployer Framework Plugin vulnerable to Path Traversal
Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the name of files in methods implementing form validation.
This allows attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Deployer Framework Plugin 86.v7b_a_4a_55b_f3ec ensures that only files contained inside the expected directory can be accessed.
Permalink: https://github.com/advisories/GHSA-hgp9-2c4w-x9mhJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oZ3A5LTJjNHcteDltaM4AAttI
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 6 months ago
CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-hgp9-2c4w-x9mh, CVE-2022-36890
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-36890
- https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2206
- http://www.openwall.com/lists/oss-security/2022/07/27/1
- https://github.com/advisories/GHSA-hgp9-2c4w-x9mh
Affected Packages
maven:org.jenkins-ci.plugins:deployer-framework
Affected Version Ranges: <= 85.v1d1888e8c021Fixed in: 86.v7b_a_4a_55b_f3ec