First published: Wed Oct 19 2022(Updated: )
Jenkins NUnit Plugin 0.27 and earlier implements an agent-to-controller message that parses files inside a user-specified directory as test results, allowing attackers able to control agent processes to obtain test results from files in an attacker-specified directory on the Jenkins controller.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Nunit | <0.28 | |
<0.28 | ||
maven/org.jenkins-ci.plugins:nunit | <=0.27 | 0.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43414 is classified as a medium severity vulnerability impacting the Jenkins NUnit Plugin.
To fix CVE-2022-43414, upgrade the Jenkins NUnit Plugin to version 0.28 or later.
CVE-2022-43414 affects users running Jenkins NUnit Plugin versions 0.27 and earlier.
Exploiting CVE-2022-43414 allows attackers to obtain test results from unauthorized files on the Jenkins controller.
CVE-2022-43414 is associated with agent-to-controller communication attacks that exploit insecure file parsing.