Jenkins Katalon vulnerabilities
4 known vulnerabilities affecting jenkins/katalon.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2022-43416HIGHCVSS 8.8fixed in 1.0.332022-10-19
CVE-2022-43416 [HIGH] CWE-94 CVE-2022-43416: Jenkins Katalon Plugin 1.0.32 and earlier implements an agent/controller message that does not limit
Jenkins Katalon Plugin 1.0.32 and earlier implements an agent/controller message that does not limit where it can be executed and allows invoking Katalon with configurable arguments, allowing attackers able to control agent processes to invoke Katalon on the Jenkins controller with attacker-controlled version, install location, and arguments, and attac
nvd
CVE-2022-43419MEDIUMCVSS 6.5fixed in 1.0.332022-10-19
CVE-2022-43419 [MEDIUM] CWE-522 CVE-2022-43419: Jenkins Katalon Plugin 1.0.32 and earlier stores API keys unencrypted in job config.xml files on the
Jenkins Katalon Plugin 1.0.32 and earlier stores API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
nvd
CVE-2022-43418MEDIUMCVSS 4.3fixed in 1.0.342022-10-19
CVE-2022-43418 [MEDIUM] CWE-352 CVE-2022-43418: A cross-site request forgery (CSRF) vulnerability in Jenkins Katalon Plugin 1.0.33 and earlier allow
A cross-site request forgery (CSRF) vulnerability in Jenkins Katalon Plugin 1.0.33 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
nvd
CVE-2022-43417MEDIUMCVSS 4.3fixed in 1.0.332022-10-19
CVE-2022-43417 [MEDIUM] CWE-862 CVE-2022-43417: Jenkins Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoin
Jenkins Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
nvd