Published on: Not Yet Published
Last Modified on: 06/23/2022 05:19:00 PM UTC
Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn't exist, and parsing files inside it as test results, allowing attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory.
- CVE-2022-34181 has been assigned by [email protected] to track the vulnerability
- Affected Vendor/Software: Jenkins project - Jenkins xUnit Plugin version <= 3.0.8
|Jenkins Security Advisory 2022-06-22|| www.jenkins.io |
|@CVEreport||CVE-2022-34181 : Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a us… twitter.com/i/web/status/1…||2022-06-22 14:49:10|
|@LinInfoSec||Jenkins - CVE-2022-34181: jenkins.io/security/advis…||2022-06-23 19:00:09|