logo

CVE-2022-43430 com.compuware.jenkins:compuware-topaz-for-total-test

Package

Manager: maven
Name: com.compuware.jenkins:compuware-topaz-for-total-test
Vulnerable Version: >=0 <2.4.9

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00339 pctl0.55985

Details

XXE vulnerability in Jenkins Compuware Topaz for Total Test Plugin Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control the input files for the 'Topaz for Total Test - Execute Total Test scenarios' build step to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Metadata

Created: 2022-10-19T19:00:18Z
Modified: 2022-12-16T19:56:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-vhwv-8897-jm7q/GHSA-vhwv-8897-jm7q.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-vhwv-8897-jm7q
Finding: F083
Auto approve: 1