Description
Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn't exist, and parsing files inside it as test results, allowing attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5890 | Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn't exist, and parsing files inside it as test results, allowing attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory. |
Github GHSA |
GHSA-298j-9q4w-6rm4 | Agent-to-controller security bypass in Jenkins xUnit Plugin |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T08:16:17.220Z
Reserved: 2022-06-21T00:00:00.000Z
Link: CVE-2022-34181
No data.
Status : Modified
Published: 2022-06-23T17:15:15.923
Modified: 2024-11-21T07:09:00.953
Link: CVE-2022-34181
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA