{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-34177","assignerOrgId":"39769cd5-e6e2-4dc8-927e-97b3aa056f5b","assignerShortName":"jenkins","dateUpdated":"2024-08-03T08:16:17.208Z","dateReserved":"2022-06-21T00:00:00.000Z","datePublished":"2022-06-22T00:00:00.000Z"},"containers":{"cna":{"affected":[{"product":"Jenkins Pipeline: Input Step Plugin","vendor":"Jenkins project","versions":[{"status":"unaffected","version":"447.449.v193fd29f6021"},{"status":"unaffected","version":"2.12.2"},{"lessThanOrEqual":"448.v37cea_9a_10a_70","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content."}],"providerMetadata":{"orgId":"39769cd5-e6e2-4dc8-927e-97b3aa056f5b","shortName":"jenkins","dateUpdated":"2023-10-24T14:22:20.551Z"},"references":[{"url":"https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2705"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T08:16:17.208Z"},"title":"CVE Program Container","references":[{"url":"https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2705","tags":["x_transferred"]}]}]}}