Jenkins Openshift Deployer
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Jenkins Openshift Deployer.
By the Year
In 2026 there have been 0 vulnerabilities in Jenkins Openshift Deployer. Openshift Deployer did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 4 | 6.50 |
| 2021 | 0 | 0.00 |
| 2020 | 1 | 5.30 |
| 2019 | 2 | 6.50 |
It may take a day or so for new Openshift Deployer vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Openshift Deployer Security Vulnerabilities
Jenkins OpenShift Deployer Plugin 1.2.0 and earlier File existence & SSH key exfiltration
CVE-2022-36909
6.5 - Medium
- July 27, 2022
A missing permission check in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key file from the Jenkins controller file system to an attacker-specified URL.
AuthZ
Jenkins OpenShift Deployer Plugin CSRF leaks SSH Key (v1.2.0)
CVE-2022-36908
6.5 - Medium
- July 27, 2022
A cross-site request forgery (CSRF) vulnerability in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key file from the Jenkins controller file system to an attacker-specified URL.
Session Riding
Jenkins OpenShift Deployer Plugin 1.2.0 Missing Permission Check
CVE-2022-36907
6.5 - Medium
- July 27, 2022
A missing permission check in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
AuthZ
Jenkins OpenShift Deployer Plug CSRF via attacker URL (v<=1.2.0)
CVE-2022-36906
6.5 - Medium
- July 27, 2022
A cross-site request forgery (CSRF) vulnerability in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password.
Session Riding
Jenkins OpenShift Deployer Plugin 1.2.0 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form
CVE-2020-2155
5.3 - Medium
- March 09, 2020
Jenkins OpenShift Deployer Plugin 1.2.0 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
Cleartext Transmission of Sensitive Information
A cross-site request forgery vulnerability in Jenkins OpenShift Deployer Plugin in the DeployApplication.DeployApplicationDescriptor#doCheckLogin form validation method
CVE-2019-1003080
6.5 - Medium
- April 04, 2019
A cross-site request forgery vulnerability in Jenkins OpenShift Deployer Plugin in the DeployApplication.DeployApplicationDescriptor#doCheckLogin form validation method allows attackers to initiate a connection to an attacker-specified server.
Session Riding
A missing permission check in Jenkins OpenShift Deployer Plugin in the DeployApplication.DeployApplicationDescriptor#doCheckLogin form validation method
CVE-2019-1003081
6.5 - Medium
- April 04, 2019
A missing permission check in Jenkins OpenShift Deployer Plugin in the DeployApplication.DeployApplicationDescriptor#doCheckLogin form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
AuthZ
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Openshift Deployer or by Jenkins? Click the Watch button to subscribe.