A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The patch is named 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027.
References
Link | Resource |
---|---|
https://github.com/cbeust/testng/commit/9150736cd2c123a6a3b60e6193630859f9f0422b | Patch Third Party Advisory |
https://github.com/cbeust/testng/pull/2806 | Exploit Patch Third Party Advisory |
https://github.com/cbeust/testng/releases/tag/7.7.1 | |
https://vuldb.com/?ctiid.214027 | |
https://vuldb.com/?id.214027 | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:56
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 |
20 Oct 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
Summary | A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The patch is named 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027. |
29 Apr 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The name of the patch is 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027. |
26 Nov 2022, 03:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:testng_project:testng:-:*:*:*:*:*:*:* | |
References | (N/A) https://github.com/cbeust/testng/pull/2806 - Exploit, Patch, Third Party Advisory | |
References | (N/A) https://vuldb.com/?id.214027 - Third Party Advisory | |
References | (N/A) https://github.com/cbeust/testng/commit/9150736cd2c123a6a3b60e6193630859f9f0422b - Patch, Third Party Advisory | |
First Time |
Testng Project
Testng Project testng |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
20 Nov 2022, 02:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-19 19:15
Updated : 2024-03-21 02:44
NVD link : CVE-2022-4065
Mitre link : CVE-2022-4065
CVE.ORG link : CVE-2022-4065
JSON object : View
Products Affected
testng_project
- testng
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')