
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-36891 is a security vulnerability discovered in Jenkins Deployer Framework Plugin versions 85.v1d1888e8c021 and earlier. The vulnerability was disclosed on July 27, 2022, and is characterized by a missing permission check in an HTTP endpoint. This vulnerability affects the Jenkins Deployer Framework Plugin, which is a component used for deployment operations in Jenkins (Jenkins Advisory).
The vulnerability is classified as Medium severity based on the CVSS scoring system. The core issue stems from the plugin's failure to perform necessary permission checks in an HTTP endpoint. This security flaw specifically affects the deployment logs access functionality within the plugin. The vulnerability exists in versions up to and including 85.v1d1888e8c021 of the Deployer Framework Plugin (Jenkins Advisory).
The vulnerability allows attackers with Item/Read permission to read deployment logs without having the required Deploy Now/Deploy permission. This unauthorized access to deployment logs could potentially expose sensitive information contained within these logs (Jenkins Advisory).
The vulnerability has been fixed in Deployer Framework Plugin version 86.v7ba4a55bf3ec. The fix implements proper permission checks requiring Deploy Now/Deploy permission to read deployment logs. Users are advised to upgrade to this version to mitigate the vulnerability (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."