File Path Disclosure in Jenkins Deployer Framework Plugin by Jenkins
CVE-2022-36890
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 27 July 2022
Summary
The Jenkins Deployer Framework Plugin, specifically versions up to 85.v1d1888e8c021, allows attackers with Item/Read permissions to exploit file validation methods. This vulnerability enables them to ascertain the presence of arbitrary file paths on the Jenkins controller's file system, posing significant risks to Jenkins installations. Organizations utilizing affected versions should prioritize mitigation strategies to safeguard their environments.
Affected Version(s)
Jenkins Deployer Framework Plugin <= 85.v1d1888e8c021
Jenkins Deployer Framework Plugin 1.3.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved