Bug 1205628 (CVE-2022-4065) - VUL-0: CVE-2022-4065: testng: Issues in sanitization of zip files could lead to path traversal and potentially code execution
Summary: VUL-0: CVE-2022-4065: testng: Issues in sanitization of zip files could lead ...
Status: RESOLVED FIXED
Alias: CVE-2022-4065
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/348408/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-4065:8.8:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2022-11-22 09:09 UTC by Cathy Hu
Modified: 2024-07-22 08:30 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Cathy Hu 2022-11-22 09:09:49 UTC
CVE-2022-4065

A vulnerability was found in cbeust testng. It has been declared as critical.
Affected by this vulnerability is the function testngXmlExistsInJar of the file
testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File
Parser. The manipulation leads to path traversal. The attack can be launched
remotely. The name of the patch is 9150736cd2c123a6a3b60e6193630859f9f0422b. It
is recommended to apply a patch to fix this issue. The associated identifier of
this vulnerability is VDB-214027.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4065
https://github.com/cbeust/testng/pull/2806
https://www.cve.org/CVERecord?id=CVE-2022-4065
https://github.com/cbeust/testng/commit/9150736cd2c123a6a3b60e6193630859f9f0422b
https://vuldb.com/?id.214027
Comment 1 OBSbugzilla Bot 2022-11-22 13:35:03 UTC
This is an autogenerated message for OBS integration:
This bug (1205628) was mentioned in
https://build.opensuse.org/request/show/1037286 Factory / testng
Comment 4 Maintenance Automation 2023-03-30 08:30:06 UTC
SUSE-SU-2023:1690-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1205628
CVE References: CVE-2022-4065
Sources used:
openSUSE Leap 15.4 (src): testng-7.4.0-150200.3.7.1
Development Tools Module 15-SP4 (src): testng-7.4.0-150200.3.7.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): testng-7.4.0-150200.3.7.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): testng-7.4.0-150200.3.7.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): testng-7.4.0-150200.3.7.1
SUSE Linux Enterprise Real Time 15 SP3 (src): testng-7.4.0-150200.3.7.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): testng-7.4.0-150200.3.7.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): testng-7.4.0-150200.3.7.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): testng-7.4.0-150200.3.7.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): testng-7.4.0-150200.3.7.1
SUSE Enterprise Storage 7.1 (src): testng-7.4.0-150200.3.7.1
SUSE Enterprise Storage 7 (src): testng-7.4.0-150200.3.7.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Fridrich Strba 2024-03-05 06:06:12 UTC
This one is fixed. Reassigning to security for closing
Comment 7 Robert Frohl 2024-05-03 09:15:10 UTC
done, closing
Comment 8 Maintenance Automation 2024-07-22 08:30:07 UTC
SUSE-SU-2024:2568-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1205628
CVE References: CVE-2022-4065
Maintenance Incident: [SUSE:Maintenance:33969](https://smelt.suse.de/incident/33969/)
Sources used:
openSUSE Leap 15.5 (src):
 testng-7.10.1-150200.3.10.1, mockito-5.11.0-150200.3.7.1, snakeyaml-2.2-150200.3.15.1
openSUSE Leap 15.6 (src):
 testng-7.10.1-150200.3.10.1, mockito-5.11.0-150200.3.7.1, snakeyaml-2.2-150200.3.15.1
Development Tools Module 15-SP5 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
Development Tools Module 15-SP6 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Package Hub 15 15-SP6 (src):
 mockito-5.11.0-150200.3.7.1
SUSE Manager Server 4.3 Module 4.3 (src):
 snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1
SUSE Enterprise Storage 7.1 (src):
 testng-7.10.1-150200.3.10.1, snakeyaml-2.2-150200.3.15.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.