GHSA-m43g-m425-p68x

Suggest an improvement
Source
https://github.com/advisories/GHSA-m43g-m425-p68x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-m43g-m425-p68x/GHSA-m43g-m425-p68x.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-m43g-m425-p68x
Aliases
Published
2025-07-01T22:59:43Z
Modified
2025-07-02T00:00:00.647565Z
Severity
  • 5.8 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
junit-platform-reporting can leak Git credentials through its OpenTestReportGeneratingListener
Details

Summary

This vulnerability affects JUnit's support for writing Open Test Reporting XML files which is an opt-in feature of junit-platform-reporting.

If a repository is cloned using a GitHub token or other credentials in its URL, for example:

git clone https://${GH_APP}:${GH_TOKEN}@github.com/example/example.git

The credentials are captured by OpenTestReportGeneratingListener which produces (trimmed for brevity):

<infrastructure>
    &lt;git:repository originUrl="https://username:token@github.com/example/example.git" />
</infrastructure>

Details

https://github.com/junit-team/junit5/blob/6b7764dac92fd35cb348152d1b37f8726875a4e0/junit-platform-reporting/src/main/java/org/junit/platform/reporting/open/xml/OpenTestReportGeneratingListener.java#L183

I think this should be configurable in some way to exclude select git information or exclude it entirely.

PoC

  1. Clone a repo using a GitHub token as shown above.
  2. Enable the listener junit.platform.reporting.open.xml.enabled=true
  3. Observe report captures credentials

Impact

Depending on the level of access of the token, it can be nothing, limited, or everything.

If these test reports are published or stored anywhere public, then there is the possibility that a rouge attacker can steal the token and perform elevated actions by impersonating the user or app.

Resolution

JUnit 5.13.2 and later replace credentials in the URL with ***. Moreover, including any Git metadata in the XML output is now an opt-in feature that can be enabled via the new junit.platform.reporting.open.xml.git.enabled=true configuration parameter but is not included by default.

Database specific
{
    "nvd_published_at": "2025-07-01T18:15:25Z",
    "severity": "MODERATE",
    "github_reviewed_at": "2025-07-01T22:59:43Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-312"
    ]
}
References

Affected packages

Maven / org.junit.platform:junit-platform-reporting

Package

Name
org.junit.platform:junit-platform-reporting
View open source insights on deps.dev
Purl
pkg:maven/org.junit.platform/junit-platform-reporting

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.12.0
Fixed
5.13.2

Database specific

{
    "last_known_affected_version_range": "<= 5.13.1"
}