Jenkins Project Jenkins Katalon Plugin vulnerabilities

4 known vulnerabilities affecting jenkins_project/jenkins_katalon_plugin.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM3

Vulnerabilities

Page 1 of 1
CVE-2022-43416HIGHCVSS 8.8≥ unspecified, ≤ 1.0.322022-10-19
CVE-2022-43416 [HIGH] CWE-94 CVE-2022-43416: Jenkins Katalon Plugin 1.0.32 and earlier implements an agent/controller message that does not limit Jenkins Katalon Plugin 1.0.32 and earlier implements an agent/controller message that does not limit where it can be executed and allows invoking Katalon with configurable arguments, allowing attackers able to control agent processes to invoke Katalon on the Jenkins controller with attacker-controlled version, install location, and arguments, and attac
cvelistv5nvd
CVE-2022-43418MEDIUMCVSS 4.3≥ unspecified, ≤ 1.0.332022-10-19
CVE-2022-43418 [MEDIUM] CWE-352 CVE-2022-43418: A cross-site request forgery (CSRF) vulnerability in Jenkins Katalon Plugin 1.0.33 and earlier allow A cross-site request forgery (CSRF) vulnerability in Jenkins Katalon Plugin 1.0.33 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
cvelistv5nvd
CVE-2022-43419MEDIUMCVSS 6.5≥ unspecified, ≤ 1.0.322022-10-19
CVE-2022-43419 [MEDIUM] CWE-522 CVE-2022-43419: Jenkins Katalon Plugin 1.0.32 and earlier stores API keys unencrypted in job config.xml files on the Jenkins Katalon Plugin 1.0.32 and earlier stores API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
cvelistv5nvd
CVE-2022-43417MEDIUMCVSS 4.3≥ unspecified, ≤ 1.0.322022-10-19
CVE-2022-43417 [MEDIUM] CWE-862 CVE-2022-43417: Jenkins Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoin Jenkins Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
cvelistv5nvd