Directory Traversal Vulnerability in Jenkins NUnit Plugin
CVE-2022-43414
5.3MEDIUM
Summary
The Jenkins NUnit Plugin versions up to and including 0.27 contains a vulnerability allowing attackers to manipulate agent-to-controller communications. This flaw lets attackers control agent processes and access test results from arbitrary files within a user-defined directory, potentially exposing sensitive data on the Jenkins controller. Proper validation of input and directories is crucial to prevent unauthorized access and ensure the integrity of the testing environment.
Affected Version(s)
Jenkins NUnit Plugin <= 0.27
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved