First published: Wed Jul 27 2022(Updated: )
A missing permission check in Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Compuware Ispw Operations | <=1.0.8 | |
maven/com.compuware.jenkins:compuware-ispw-operations | <=1.0.8 | 1.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36898 is a vulnerability in Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier that allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.
CVE-2022-36898 has a severity score of 4.3, which is considered medium.
Jenkins Compuware ISPW Operations Plugin versions up to and including 1.0.8 and Jenkins BMC AMI DevX Code Pipeline Operations Plugin versions up to and including 1.0.8 are affected by CVE-2022-36898.
To fix the missing permission check vulnerability in Jenkins Compuware ISPW Operations Plugin, you should update to version 1.0.9 or later.
You can find more information about CVE-2022-36898 on the Openwall, Jenkins, and NIST websites.