Name | CVE-2025-53103 |
Description | JUnit is a testing framework for Java and the JVM. From version 5.12.0 to 5.13.1, JUnit's support for writing Open Test Reporting XML files can leak Git credentials. The impact depends on the level of the access token exposed through the OpenTestReportGeneratingListener. If these test reports are published or stored anywhere public, then there is the possibility that a rouge attacker can steal the token and perform elevated actions by impersonating the user or app. This issue as been patched in version 5.13.2. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
junit5 (PTS) | bullseye | 5.3.2-4 | fixed |
| bookworm | 5.9.2-1 | fixed |
| trixie, sid | 5.10.3-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
junit5 | source | (unstable) | (not affected) | | | |
Notes
- junit5 <not-affected> (Vulnerable code not present, introduced in 5.12)
https://github.com/junit-team/junit-framework/security/advisories/GHSA-m43g-m425-p68x
Fixed by: https://github.com/junit-team/junit-framework/commit/d4fc834c8c1c0b3168cd030c13551d1d041f51bc (r5.13.2)