logo

CVE-2022-43428 com.compuware.jenkins:compuware-topaz-for-total-test

Package

Manager: maven
Name: com.compuware.jenkins:compuware-topaz-for-total-test
Vulnerable Version: >=0 <2.4.9

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00274 pctl0.50471

Details

Agent-to-controller security bypass vulnerabilities in Jenkins Compuware Topaz for Total Test Plugin Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process. These vulnerabilities are only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.303/#upgrading-to-jenkins-lts-2-303-3).

Metadata

Created: 2022-10-19T19:00:22Z
Modified: 2022-12-16T19:55:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-xp3r-9wx8-q2mm/GHSA-xp3r-9wx8-q2mm.json
CWE IDs: ["CWE-610", "CWE-693"]
Alternative ID: GHSA-xp3r-9wx8-q2mm
Finding: F115
Auto approve: 1