SB2022102113 - Multiple vulnerabilities in Jenkins Katalon plugin
Published: October 21, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Security features bypass (CVE-ID: CVE-2022-43416)
The vulnerability allows a remote attacker to bypass security features.
The vulnerability exists due to the agent-to-controller security bypass issue. A remote user can bypass security restrictions and execute arbitrary OS commands.
2) Cleartext storage of sensitive information (CVE-ID: CVE-2022-43419)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the affected plugin stores API keys unencrypted in job config.xml files on the Jenkins controller as part of its configuration. A remote user can view these API keys.
3) Missing Authorization (CVE-ID: CVE-2022-43417)
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to the affected plugin does not perform permission checks in several HTTP endpoints. A remote user can connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method and capture credentials stored in Jenkins.
Remediation
Install update from vendor's website.