First published: Wed Jul 27 2022(Updated: )
A missing permission check in Jenkins Compuware Topaz Utilities Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.compuware.jenkins:compuware-topaz-utilities | <=1.0.8 | 1.0.9 |
Jenkins Compuware Topaz Utilities | <=1.0.8 | |
<=1.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36895 is a vulnerability in the Jenkins Compuware Topaz Utilities Plugin 1.0.8 and earlier that allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.
CVE-2022-36895 has a severity rating of 4.3, which is considered medium.
CVE-2022-36895 affects Jenkins Compuware Topaz Utilities Plugin 1.0.8 and earlier versions by not performing permission checks in several HTTP endpoints.
Attackers with Overall/Read permission can use CVE-2022-36895 to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.
To fix CVE-2022-36895, upgrade to version 1.0.9 of Jenkins Compuware Topaz Utilities Plugin or later.