A vulnerability was found in cbeust testng. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. The name of the patch is 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-214027.
References
Link | Resource |
---|---|
https://github.com/cbeust/testng/commit/9150736cd2c123a6a3b60e6193630859f9f0422b | Patch Third Party Advisory |
https://github.com/cbeust/testng/pull/2806 | Exploit Patch Third Party Advisory |
https://vuldb.com/?id.214027 | Third Party Advisory |
Configurations
Information
Published : 2022-11-19 11:15
Updated : 2022-11-25 19:24
NVD link : CVE-2022-4065
Mitre link : CVE-2022-4065
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
testng_project
- testng