CVE-2022-36889:
Jenkins Deployer Framework Plugin does not restrict application path of applications when configuring a deployment
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.4365%
CWE
Published
7/28/2022
Updated
2/2/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:deployer-framework | maven | <= 85.v1d1888e8c021 | 86.v7b_a_4a_55b_f3ec |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path validation during deployment configuration. Key indicators:
- The advisory explicitly states the plugin didn't restrict application paths during deployment setup.
- The CWE-22 classification confirms this is a path traversal issue.
- The patched version added restrictions to only allow build artifacts, implying the original implementation lacked path validation.
- Jenkins plugin patterns suggest deployment logic would be in Deployer classes, and form validation in Descriptor classes.
- The 'Item/Configure' permission requirement aligns with these being configuration-related functions.