CVE-2022-4065: A vulnerability was found in cbeust testng. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. The name of the patch is 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-214027. Patch: https://github.com/cbeust/testng/commit/9150736cd2c123a6a3b60e6193630859f9f0422b Only 4 since it seems rather unlikely to be exploitable.
Fix is in 7.7.0.
(In reply to John Helmert III from comment #0) > CVE-2022-4065: > > A vulnerability was found in cbeust testng. It has been declared as > critical. Affected by this vulnerability is the function > testngXmlExistsInJar of the file > testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML > File Parser. [...] Gentoo stucks on version 6.9.10 which does not seem to have "JarFileUtils.java". Are we still vulnertable?
Ah, you're right, maybe not.