Логотип exploitDog
bind:CVE-2022-34177
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-34177

Количество 3

Количество 3

redhat логотип

CVE-2022-34177

около 3 лет назад

Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-34177

около 3 лет назад

Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-29q6-p2cg-4v23

около 3 лет назад

Arbitrary file write vulnerability in Jenkins Pipeline: Input Step Plugin

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2022-34177

Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-34177

Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-29q6-p2cg-4v23

Arbitrary file write vulnerability in Jenkins Pipeline: Input Step Plugin

CVSS3: 8.8
0%
Низкий
около 3 лет назад

Уязвимостей на страницу