Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1oZ3A5LTJjNHcteDltaM4AAttI

Jenkins Deployer Framework Plugin vulnerable to Path Traversal

Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the name of files in methods implementing form validation.

This allows attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

Deployer Framework Plugin 86.v7b_a_4a_55b_f3ec ensures that only files contained inside the expected directory can be accessed.

Permalink: https://github.com/advisories/GHSA-hgp9-2c4w-x9mh
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oZ3A5LTJjNHcteDltaM4AAttI
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 6 months ago


CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Identifiers: GHSA-hgp9-2c4w-x9mh, CVE-2022-36890
References: Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:deployer-framework
Affected Version Ranges: <= 85.v1d1888e8c021
Fixed in: 86.v7b_a_4a_55b_f3ec