File Manipulation Vulnerability in Jenkins Pipeline Input Step Plugin
CVE-2022-34177
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 23 June 2022
Summary
The Jenkins Pipeline Input Step Plugin suffers from a security issue that allows for improper file handling. Specifically, it archives uploaded files associated with file
parameters for Pipeline input
steps within the controller. This occurs without appropriate sanitization, which means attackers can exploit this feature to craft Pipelines that may create or overwrite files in the Jenkins controller file system with their own content. Consequently, this vulnerability poses a serious risk for unauthorized file manipulation, potentially compromising the integrity and security of build processes.
Affected Version(s)
Jenkins Pipeline: Input Step Plugin <= 448.v37cea_9a_10a_70
Jenkins Pipeline: Input Step Plugin 447.449.v193fd29f6021
Jenkins Pipeline: Input Step Plugin 2.12.2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved