You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are using Dependency Track to manage our dependencies, and it mentions that TestNG 7.8.0 is vulnerable (CVE-2022-4065).
Is this analyzed and confirmed as a fake positive by the team?
Here is an overview and references:
Overview
A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The patch is named 9150736. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027.
TestNG Version
7.8.0
We are using Dependency Track to manage our dependencies, and it mentions that TestNG 7.8.0 is vulnerable (CVE-2022-4065).
Is this analyzed and confirmed as a fake positive by the team?
Here is an overview and references:
The text was updated successfully, but these errors were encountered: