First published: Wed Oct 19 2022(Updated: )
Jenkins Katalon Plugin 1.0.32 and earlier implements an agent/controller message that does not limit where it can be executed and allows invoking Katalon with configurable arguments, allowing attackers able to control agent processes to invoke Katalon on the Jenkins controller with attacker-controlled version, install location, and arguments, and attackers additionally able to create files on the Jenkins controller (e.g., attackers with Item/Configure permission could archive artifacts) to invoke arbitrary OS commands.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:katalon | <1.0.33 | 1.0.33 |
Jenkins Katalon | <1.0.33 | |
Jenkins Jenkins | <=2.303.2 | |
Jenkins Jenkins | <=2.318 | |
All of | ||
Jenkins Katalon | <1.0.33 | |
Any of | ||
Jenkins Jenkins | <=2.303.2 | |
Jenkins Jenkins | <=2.318 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43416 is a vulnerability in Jenkins Katalon Plugin 1.0.32 and earlier that allows attackers to execute unauthorized commands on the Jenkins controller.
CVE-2022-43416 has a severity rating of 8.8 (high).
CVE-2022-43416 allows attackers with control over agent processes to execute Katalon on the Jenkins controller with attacker-controlled arguments.
To fix CVE-2022-43416, update Jenkins Katalon Plugin to version 1.0.33 or later.
You can find more information about CVE-2022-43416 on the following references: [1] http://www.openwall.com/lists/oss-security/2022/10/19/3 [2] https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2844 [3] https://nvd.nist.gov/vuln/detail/CVE-2022-43416