First published: Wed Oct 19 2022(Updated: )
BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier implements an agent/controller message that does not limit where it can be executed. It allows attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process. This vulnerability is only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.303/#upgrading-to-jenkins-lts-2-303-3). BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.13 restricts execution of the agent/controller message to agents.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Compuware Source Code Download For Endevor\, Pds\, And Ispw | <2.0.13 | |
Jenkins Jenkins | <=2.303.2 | |
Jenkins Jenkins | <=2.318 | |
All of | ||
<2.0.13 | ||
Any of | ||
<=2.303.2 | ||
<=2.318 | ||
maven/com.compuware.jenkins:compuware-scm-downloader | <2.0.13 | 2.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Jenkins vulnerability is CVE-2022-43423.
The severity of CVE-2022-43423 is medium with a CVSS score of 5.3.
The affected software of CVE-2022-43423 is Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin version 2.0.12 and earlier.
Attackers able to control agent processes can exploit CVE-2022-43423 to obtain the values of Java system properties from the Jenkins controller.
No, the Jenkins LTS versions are not vulnerable to CVE-2022-43423.