File Manipulation Vulnerability in Jenkins Pipeline Input Step Plugin
CVE-2022-34177

7.5HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
23 June 2022

Summary

The Jenkins Pipeline Input Step Plugin suffers from a security issue that allows for improper file handling. Specifically, it archives uploaded files associated with file parameters for Pipeline input steps within the controller. This occurs without appropriate sanitization, which means attackers can exploit this feature to craft Pipelines that may create or overwrite files in the Jenkins controller file system with their own content. Consequently, this vulnerability poses a serious risk for unauthorized file manipulation, potentially compromising the integrity and security of build processes.

Affected Version(s)

Jenkins Pipeline: Input Step Plugin <= 448.v37cea_9a_10a_70

Jenkins Pipeline: Input Step Plugin 447.449.v193fd29f6021

Jenkins Pipeline: Input Step Plugin 2.12.2

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.