CVE-2022-34177

Name
CVE-2022-34177
Description
Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2705

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:jenkins:pipeline\:_input_step:*:*:*:*:*:jenkins:*:* jenkins >= None <= 448.v37cea_9a_10a_70

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
jenkins edge-community 2.346.2-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.16-community 2.346.2-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable