Lucene search

K
githubGitHub Advisory DatabaseGHSA-Q6F6-6C4P-XPH4
HistoryOct 19, 2022 - 7:00 p.m.

Jenkins Katalon Plugin vulnerable to Protection Mechanism Failure

2022-10-1919:00:18
CWE-693
GitHub Advisory Database
github.com
16
jenkins
katalon
plugin
security
flaw
controller
agent
arbitrary
os commands
execution
control
installation
configuration
attacker.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

42.9%

Jenkins Katalon Plugin 1.0.32 and earlier implements an agent/controller message that does not limit where it can be executed and allows invoking Katalon with configurable arguments.

It allows attackers able to control agent processes to invoke Katalon on the Jenkins controller with attacker-controlled version, install location, and arguments. Attackers additionally able to create files on the Jenkins controller (e.g., attackers with Item/Configure permission could archive artifacts) can invoke arbitrary OS commands.

Katalon Plugin 1.0.33 changes the message type to controller-to-agent, preventing execution on the controller.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchkatalon
CPENameOperatorVersion
org.jenkins-ci.plugins:katalonlt1.0.33

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

42.9%

Related for GHSA-Q6F6-6C4P-XPH4