Lucene search

K
cvelistJenkinsCVELIST:CVE-2022-34177
HistoryJun 22, 2022 - 12:00 a.m.

CVE-2022-34177

2022-06-2200:00:00
jenkins
www.cve.org
2

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.2%

Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for file parameters for Pipeline input steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

CNA Affected

[
  {
    "product": "Jenkins Pipeline: Input Step Plugin",
    "vendor": "Jenkins project",
    "versions": [
      {
        "status": "unaffected",
        "version": "447.449.v193fd29f6021"
      },
      {
        "status": "unaffected",
        "version": "2.12.2"
      },
      {
        "lessThanOrEqual": "448.v37cea_9a_10a_70",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.2%