SB2022102113 - Multiple vulnerabilities in Jenkins Katalon plugin



SB2022102113 - Multiple vulnerabilities in Jenkins Katalon plugin

Published: October 21, 2022

Security Bulletin ID SB2022102113
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Security features bypass (CVE-ID: CVE-2022-43416)

The vulnerability allows a remote attacker to bypass security features.

The vulnerability exists due to the agent-to-controller security bypass issue. A remote user can bypass security restrictions and execute arbitrary OS commands.


2) Cleartext storage of sensitive information (CVE-ID: CVE-2022-43419)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the affected plugin stores API keys unencrypted in job config.xml files on the Jenkins controller as part of its configuration. A remote user can view these API keys.


3) Missing Authorization (CVE-ID: CVE-2022-43417)

The vulnerability allows a remote attacker to bypass authorization checks.

The vulnerability exists due to the affected plugin does not perform permission checks in several HTTP endpoints. A remote user can connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method and capture credentials stored in Jenkins.


Remediation

Install update from vendor's website.