Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rc2q-x9mf-w3vf

Опубликовано: 19 нояб. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.8

Описание

TestNG is vulnerable to Path Traversal

Impact

Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser.

The manipulation leads to path traversal only for .xml, .yaml and .yml files by default. The attack implies running an unsafe test JAR. However since that JAR can also contain executable code itself, the path traversal is unlikely to be the main attack.

Patches

A patch is available in version 7.7.0 at commit 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to apply a patch to fix this issue. The patch was pushed into the master branch but no releases have yet been made with the patch included.

A backport of the fix is available in [version 7.5.1]((https://github.com/cbeust/testng/releases/tag/7.5.1) for Java 8 projects.

Workaround

  • Specify which tests to run when invoking TestNG by configuring them on the CLI or in the build tool controlling the run.
  • Do not run tests with untrusted JARs on the classpath, this includes pull requests on open source projects.

Пакеты

Наименование

org.testng:testng

maven
Затронутые версииВерсия исправления

>= 6.13, < 7.5.1

7.5.1

Наименование

org.testng:testng

maven
Затронутые версииВерсия исправления

>= 7.6.0, < 7.7.0

7.7.0

EPSS

Процентиль: 38%
0.00169
Низкий

7.8 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 3 лет назад

A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The patch is named 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027.

CVSS3: 7
redhat
около 3 лет назад

A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The patch is named 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027.

CVSS3: 5.5
nvd
около 3 лет назад

A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The patch is named 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027.

CVSS3: 5.5
debian
около 3 лет назад

A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It ...

suse-cvrf
больше 1 года назад

Security update for mockito, snakeyaml, testng

EPSS

Процентиль: 38%
0.00169
Низкий

7.8 High

CVSS3

Дефекты

CWE-22