CVE-2022-43427 – com.compuware.jenkins:compuware-topaz-for-total-test
Package
Manager: maven
Name: com.compuware.jenkins:compuware-topaz-for-total-test
Vulnerable Version: >=0 <2.4.9
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00173 pctl0.39093
Details
Jenkins Compuware Topaz for Total Test Plugin allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Metadata
Created: 2022-10-19T19:00:18Z
Modified: 2022-10-25T20:35:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-x5gv-5rqv-654m/GHSA-x5gv-5rqv-654m.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-x5gv-5rqv-654m
Finding: F039
Auto approve: 1