First published: Wed Jul 27 2022(Updated: )
A missing permission check in Jenkins Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.compuware.jenkins:compuware-xpediter-code-coverage | <=1.0.7 | 1.0.8 |
Jenkins Compuware Xpediter Code Coverage | <=1.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36897 is a vulnerability in Jenkins Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier that allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.
The severity of CVE-2022-36897 is medium, with a severity value of 4.3.
CVE-2022-36897 impacts Jenkins by not performing permission checks in several HTTP endpoints, which allows attackers to obtain sensitive information.
The affected software for CVE-2022-36897 includes Jenkins Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier.
To fix CVE-2022-36897, users should update to version 1.0.8 of the Jenkins Compuware Xpediter Code Coverage Plugin.