Directory Traversal Vulnerability in Jenkins NUnit Plugin
CVE-2022-43414

5.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
19 October 2022

Summary

The Jenkins NUnit Plugin versions up to and including 0.27 contains a vulnerability allowing attackers to manipulate agent-to-controller communications. This flaw lets attackers control agent processes and access test results from arbitrary files within a user-defined directory, potentially exposing sensitive data on the Jenkins controller. Proper validation of input and directories is crucial to prevent unauthorized access and ensure the integrity of the testing environment.

Affected Version(s)

Jenkins NUnit Plugin <= 0.27

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.