Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-298j-9q4w-6rm4

Опубликовано: 24 июн. 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Agent-to-controller security bypass in Jenkins xUnit Plugin

xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn’t exist, and parsing files inside it as test results.

This allows attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory.

xUnit Plugin 3.1.0 changes the message type from agent-to-controller to controller-to-agent, preventing execution on the controller.

Пакеты

Наименование

org.jenkins-ci.plugins:xunit

maven
Затронутые версииВерсия исправления

< 3.1.0

3.1.0

EPSS

Процентиль: 80%
0.01342
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-693

Связанные уязвимости

CVSS3: 9.1
nvd
больше 3 лет назад

Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn't exist, and parsing files inside it as test results, allowing attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory.

EPSS

Процентиль: 80%
0.01342
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-693