Bug 2103551 (CVE-2022-34177) - CVE-2022-34177 jenkins-plugin: Arbitrary file write vulnerability in Pipeline Input Step Plugin
Summary: CVE-2022-34177 jenkins-plugin: Arbitrary file write vulnerability in Pipeline...
Keywords:
Status: NEW
Alias: CVE-2022-34177
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2103552 2103554 2103555 2106260 2103553 2103556 2103557
Blocks: 2102442 2119640
TreeView+ depends on / blocked
 
Reported: 2022-07-04 05:10 UTC by Avinash Hanwate
Modified: 2022-09-30 18:51 UTC (History)
9 users (show)

Fixed In Version: Pipeline Input Step Plugin 449.v77f0e8b_845c4
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Pipeline Input Step Plugin. This issue affects the code of the component Archive File Handler. The manipulation of the argument file with a malicious input leads to a directory traversal vulnerability.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:6531 0 None None None 2022-09-21 14:00:07 UTC

Description Avinash Hanwate 2022-07-04 05:10:13 UTC
Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2705
https://nvd.nist.gov/vuln/detail/CVE-2022-34177

Comment 3 errata-xmlrpc 2022-09-21 14:00:05 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.10

Via RHSA-2022:6531 https://access.redhat.com/errata/RHSA-2022:6531


Note You need to log in before you can comment on or make changes to this bug.