Miggo Logo

CVE-2022-36889:
Jenkins Deployer Framework Plugin does not restrict application path of applications when configuring a deployment

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.4365%
Published
7/28/2022
Updated
2/2/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:deployer-frameworkmaven<= 85.v1d1888e8c02186.v7b_a_4a_55b_f3ec

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path validation during deployment configuration. Key indicators:

  1. The advisory explicitly states the plugin didn't restrict application paths during deployment setup.
  2. The CWE-22 classification confirms this is a path traversal issue.
  3. The patched version added restrictions to only allow build artifacts, implying the original implementation lacked path validation.
  4. Jenkins plugin patterns suggest deployment logic would be in Deployer classes, and form validation in Descriptor classes.
  5. The 'Item/Configure' permission requirement aligns with these being configuration-related functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins **ploy*r *r*m*work Plu*in **.v************ *n* **rli*r *o*s not r*stri*t t** *ppli**tion p*t* o* t** *ppli**tions w**n *on*i*urin* * **ploym*nt, *llowin* *tt**k*rs wit* It*m/*on*i*ur* p*rmission to uplo** *r*itr*ry *il*s *rom t** J*nkins *ont

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* v*li**tion *urin* **ploym*nt *on*i*ur*tion. K*y in*i**tors: *. T** **visory *xpli*itly st*t*s t** plu*in *i*n't r*stri*t *ppli**tion p*t*s *urin* **ploym*nt s*tup. *. T** *W*-** *l*ssi*i**tion *on*irms t*is