CVE-2022-34181
Published on: Not Yet Published
Last Modified on: 06/29/2022 03:37:00 PM UTC
Certain versions of Xunit from Jenkins contain the following vulnerability:
Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn't exist, and parsing files inside it as test results, allowing attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory.
- CVE-2022-34181 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
- Affected Vendor/Software:
Jenkins project - Jenkins xUnit Plugin version <= 3.0.8
CVSS3 Score: 9.1 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | NONE |
CVSS2 Score: 6.4 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2022-06-22 | www.jenkins.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Jenkins | Xunit | All | All | All | All |
- cpe:2.3:a:jenkins:xunit:*:*:*:*:*:jenkins:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-34181 : Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a us… twitter.com/i/web/status/1… | 2022-06-22 14:49:10 |
![]() |
Jenkins - CVE-2022-34181: jenkins.io/security/advis… | 2022-06-23 19:00:09 |