Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-34177

EPSS 0.11% · P29
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-34177

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Jenkins Plugin Pipeline 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Jenkins是Jenkins开源的一个应用软件。一个开源自动化服务器Jenkins提供了数百个插件来支持构建,部署和自动化任何项目。Jenkins Pipeline是一套插件,支持将持续交付管道实施和集成到 Jenkins 中。 Jenkins Plugin Pipeline 448.v37cea_9a_10a_70 及之前版本存在安全漏洞,该漏洞源于使用file管道input,攻击者利用该漏洞可以使用攻击者指定的内容创建或替换 Jenkins 控制器文件系统上的任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Jenkins projectJenkins Pipeline: Input Step Plugin 447.449.v193fd29f6021 -

II. Public POCs for CVE-2022-34177

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-34177

登录查看更多情报信息。

Same Patch Batch · Jenkins project · 2022-06-22 · 44 CVEs total

CVE-2022-34202Jenkins Plugin EasyQA 安全漏洞
CVE-2022-34205Jenkins Plugin Jianliao Notification 跨站请求伪造漏洞
CVE-2022-34204Jenkins Plugin EasyQA 跨站请求伪造漏洞
CVE-2022-34206Jenkins Plugin Jianliao Notification 跨站请求伪造漏洞
CVE-2022-34209Jenkins Plugin ThreadFix 跨站请求伪造漏洞
CVE-2022-34210Jenkins Plugin ThreadFix 跨站请求伪造漏洞
CVE-2022-34211Jenkins Plugin vRealize Orchestrator 跨站请求伪造漏洞
CVE-2022-34212Jenkins Plugin vRealize Orchestrator 跨站请求伪造漏洞
CVE-2022-34213Jenkins Plugin Squash TM Publisher 安全漏洞
CVE-2022-34208Jenkins Plugin Beaker 跨站请求伪造漏洞
CVE-2022-34203Jenkins Plugin EasyQA 跨站请求伪造漏洞
CVE-2022-34201Jenkins Plugin Convertigo Mobile Platform 安全漏洞
CVE-2022-34200Jenkins Plugin Convertigo Mobile Platform 跨站请求伪造漏洞
CVE-2022-34199Jenkins Plugin Convertigo Mobile Platform 安全漏洞
CVE-2022-34198Jenkins Plugin Stash Branch Parameter 跨站脚本漏洞
CVE-2022-34197Jenkins Plugin Sauce OnDemand 跨站脚本漏洞
CVE-2022-34196Jenkins Plugin REST List Parameter 跨站脚本漏洞
CVE-2022-34195Jenkins Plugin Repository Connector 跨站脚本漏洞
CVE-2022-34194Jenkins Plugin Readonly Parameter 跨站脚本漏洞
CVE-2022-34193Jenkins Plugin Package 跨站脚本漏洞

Showing top 20 of 44 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-34177

No comments yet


Leave a comment