Lucene search

K
githubGitHub Advisory DatabaseGHSA-8CXW-WVHC-P4X4
HistoryOct 19, 2022 - 7:00 p.m.

Jenkins NUnit Plugin vulnerable to Protection Mechanism Failure

2022-10-1919:00:22
CWE-693
GitHub Advisory Database
github.com
11
jenkins
nunit plugin
vulnerability
fix
agent-to-controller
message
directory
attacker
test results
execution

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

33.7%

Jenkins NUnit Plugin 0.27 and earlier implements an agent-to-controller message that parses files inside a user-specified directory as test results, allowing attackers able to control agent processes to obtain test results from files in an attacker-specified directory on the Jenkins controller. NUnit Plugin 0.28 changes the message type from agent-to-controller to controller-to-agent, preventing execution on the controller.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchnunit
CPENameOperatorVersion
org.jenkins-ci.plugins:nunitle0.27

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

33.7%

Related for GHSA-8CXW-WVHC-P4X4