CVE-2022-34177
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
23/06/2022
Last modified:
03/11/2023
Description
Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:jenkins:pipeline\:_input_step:*:*:*:*:*:jenkins:*:* | 448.v37cea_9a_10a_70 (including) |
To consult the complete list of CPE names with products and versions, see this page



