CVE-2022-43416

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-43416
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-43416.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-43416
Aliases
Withdrawn
2024-09-03T04:38:28.036501Z
Published
2022-10-19T16:15:11Z
Modified
2024-09-03T04:20:16.420814Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Jenkins Katalon Plugin 1.0.32 and earlier implements an agent/controller message that does not limit where it can be executed and allows invoking Katalon with configurable arguments, allowing attackers able to control agent processes to invoke Katalon on the Jenkins controller with attacker-controlled version, install location, and arguments, and attackers additionally able to create files on the Jenkins controller (e.g., attackers with Item/Configure permission could archive artifacts) to invoke arbitrary OS commands.

References

Affected packages

Git / github.com/jenkinsci/katalon-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/katalon-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.29
1.0.30
1.0.31
1.0.32

katalon-1.*

katalon-1.0.0
katalon-1.0.1
katalon-1.0.10
katalon-1.0.11
katalon-1.0.14
katalon-1.0.15
katalon-1.0.17
katalon-1.0.18
katalon-1.0.19
katalon-1.0.2
katalon-1.0.20
katalon-1.0.21
katalon-1.0.22
katalon-1.0.23
katalon-1.0.24
katalon-1.0.25
katalon-1.0.26
katalon-1.0.27
katalon-1.0.28
katalon-1.0.3
katalon-1.0.4
katalon-1.0.5
katalon-1.0.6
katalon-1.0.7
katalon-1.0.8
katalon-1.0.9