CVE-2022-34177

Source
https://cve.org/CVERecord?id=CVE-2022-34177
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-34177.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-34177
Aliases
Downstream
Published
2022-06-23T17:15:15.680Z
Modified
2026-01-29T06:15:17.865880Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Jenkins Pipeline: Input Step Plugin 448.v37cea9a10a_70 and earlier archives files uploaded for file parameters for Pipeline input steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

References

Affected packages

Git / github.com/jenkinsci/pipeline-input-step-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/pipeline-input-step-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

427.*
427.va6441fa17010
446.*
446.vf27b_0b_83500e
447.*
447.v95e5a_6e3502a_
448.*
448.v37cea_9a_10a_70
pipeline-input-step-2.*
pipeline-input-step-2.0
pipeline-input-step-2.1
pipeline-input-step-2.10
pipeline-input-step-2.11
pipeline-input-step-2.12
pipeline-input-step-2.2
pipeline-input-step-2.3
pipeline-input-step-2.4
pipeline-input-step-2.5
pipeline-input-step-2.6
pipeline-input-step-2.7
pipeline-input-step-2.8
pipeline-input-step-2.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-34177.json"