Vulnerability Details CVE-2022-43414
Jenkins NUnit Plugin 0.27 and earlier implements an agent-to-controller message that parses files inside a user-specified directory as test results, allowing attackers able to control agent processes to obtain test results from files in an attacker-specified directory on the Jenkins controller.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 30.5%
CVSS Severity
CVSS v3 Score 5.3
Products affected by CVE-2022-43414
-
cpe:2.3:a:jenkins:nunit:-
-
cpe:2.3:a:jenkins:nunit:0.1
-
cpe:2.3:a:jenkins:nunit:0.10
-
cpe:2.3:a:jenkins:nunit:0.11
-
cpe:2.3:a:jenkins:nunit:0.12
-
cpe:2.3:a:jenkins:nunit:0.13
-
cpe:2.3:a:jenkins:nunit:0.14
-
cpe:2.3:a:jenkins:nunit:0.15
-
cpe:2.3:a:jenkins:nunit:0.16
-
cpe:2.3:a:jenkins:nunit:0.17
-
cpe:2.3:a:jenkins:nunit:0.18
-
cpe:2.3:a:jenkins:nunit:0.19
-
cpe:2.3:a:jenkins:nunit:0.2
-
cpe:2.3:a:jenkins:nunit:0.2.1
-
cpe:2.3:a:jenkins:nunit:0.2.2
-
cpe:2.3:a:jenkins:nunit:0.2.3
-
cpe:2.3:a:jenkins:nunit:0.20
-
cpe:2.3:a:jenkins:nunit:0.21
-
cpe:2.3:a:jenkins:nunit:0.22
-
cpe:2.3:a:jenkins:nunit:0.23
-
cpe:2.3:a:jenkins:nunit:0.24
-
cpe:2.3:a:jenkins:nunit:0.25
-
cpe:2.3:a:jenkins:nunit:0.26
-
cpe:2.3:a:jenkins:nunit:0.27
-
cpe:2.3:a:jenkins:nunit:0.3
-
cpe:2.3:a:jenkins:nunit:0.4
-
cpe:2.3:a:jenkins:nunit:0.5
-
cpe:2.3:a:jenkins:nunit:0.6
-
cpe:2.3:a:jenkins:nunit:0.7
-
cpe:2.3:a:jenkins:nunit:0.8
-
cpe:2.3:a:jenkins:nunit:0.9