Vulnerability Details CVE-2022-36893
Jenkins rpmsign-plugin Plugin 0.5.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 28.9%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2022-36893
-
cpe:2.3:a:jenkins:rpmsign-plugin:0.1
-
cpe:2.3:a:jenkins:rpmsign-plugin:0.3
-
cpe:2.3:a:jenkins:rpmsign-plugin:0.4
-
cpe:2.3:a:jenkins:rpmsign-plugin:0.4.1
-
cpe:2.3:a:jenkins:rpmsign-plugin:0.4.2
-
cpe:2.3:a:jenkins:rpmsign-plugin:0.4.3
-
cpe:2.3:a:jenkins:rpmsign-plugin:0.4.4
-
cpe:2.3:a:jenkins:rpmsign-plugin:0.4.5
-
cpe:2.3:a:jenkins:rpmsign-plugin:0.4.6
-
cpe:2.3:a:jenkins:rpmsign-plugin:0.5.0