Bug 2103551 (CVE-2022-34177) - CVE-2022-34177 jenkins-plugin: Arbitrary file write vulnerability in Pipeline Input Step Plugin
Summary: CVE-2022-34177 jenkins-plugin: Arbitrary file write vulnerability in Pipeline...
Status: NEW
Alias: CVE-2022-34177
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 2103552 2103554 2103555 2106260 2103553 2103556 2103557
Blocks: 2102442 2119640
TreeView+ depends on / blocked
Reported: 2022-07-04 05:10 UTC by Avinash Hanwate
Modified: 2022-09-30 18:51 UTC (History)
9 users (show)

Fixed In Version: Pipeline Input Step Plugin 449.v77f0e8b_845c4
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Pipeline Input Step Plugin. This issue affects the code of the component Archive File Handler. The manipulation of the argument file with a malicious input leads to a directory traversal vulnerability.
Clone Of:
Last Closed:

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:6531 0 None None None 2022-09-21 14:00:07 UTC

Description Avinash Hanwate 2022-07-04 05:10:13 UTC
Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.


Comment 3 errata-xmlrpc 2022-09-21 14:00:05 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.10

Via RHSA-2022:6531 https://access.redhat.com/errata/RHSA-2022:6531

Note You need to log in before you can comment on or make changes to this bug.