CVE-2022-34177
Jenkins Pipeline: Input Step Plugin 448.v37cea9a10a_70 and earlier archives files uploaded for file parameters for Pipeline input steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
, https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2705
