First published: Wed Jun 22 2022(Updated: )
A flaw was found in the Pipeline Input Step Plugin. This issue affects the code of the component Archive File Handler. The manipulation of the argument file with a malicious input leads to a directory traversal vulnerability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Pipeline\ | <=448.v37cea_9a_10a_70 | |
<=448.v37cea_9a_10a_70 | ||
redhat/Pipeline Input Step Plugin | <449. | 449. |
redhat/jenkins | <2-plugins-0:4.10.1663147786-1.el8 | 2-plugins-0:4.10.1663147786-1.el8 |
redhat/jenkins | <2-plugins-0:4.8.1672842762-1.el8 | 2-plugins-0:4.8.1672842762-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1669894222-1.el8 | 2-plugins-0:4.9.1669894222-1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-34177 is classified as a directory traversal vulnerability affecting Jenkins Pipeline: Input Step Plugin.
To fix CVE-2022-34177, upgrade to Jenkins Pipeline: Input Step Plugin version 449 or later.
CVE-2022-34177 affects Jenkins Pipeline: Input Step Plugin versions up to and including 448.v37cea_9a_10a_70.
CVE-2022-34177 is a directory traversal vulnerability due to malicious input in the Archive File Handler component.
Users of Jenkins with the Pipeline: Input Step Plugin version 448.v37cea_9a_10a_70 or earlier are affected by CVE-2022-34177.