File Manipulation Vulnerability in Jenkins Pipeline Input Step Plugin
CVE-2022-34177
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 23 June 2022
What is CVE-2022-34177?
The Jenkins Pipeline Input Step Plugin suffers from a security issue that allows for improper file handling. Specifically, it archives uploaded files associated with file parameters for Pipeline input steps within the controller. This occurs without appropriate sanitization, which means attackers can exploit this feature to craft Pipelines that may create or overwrite files in the Jenkins controller file system with their own content. Consequently, this vulnerability poses a serious risk for unauthorized file manipulation, potentially compromising the integrity and security of build processes.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Pipeline: Input Step Plugin <= 448.v37cea_9a_10a_70
Jenkins Pipeline: Input Step Plugin 447.449.v193fd29f6021
Jenkins Pipeline: Input Step Plugin 2.12.2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved