First published: Wed Oct 19 2022(Updated: )
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.compuware.jenkins:compuware-topaz-for-total-test | <=2.4.8 | 2.4.9 |
Jenkins Compuware Topaz For Total Test | <=2.4.8 | |
Jenkins Jenkins | <=2.303.2 | |
Jenkins Jenkins | <=2.318 | |
All of | ||
Jenkins Compuware Topaz For Total Test | <=2.4.8 | |
Any of | ||
Jenkins Jenkins | <=2.303.2 | |
Jenkins Jenkins | <=2.318 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43428 is a vulnerability in Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier that allows attackers to obtain the values of Java system properties from the Jenkins controller process.
Jenkins Compuware Topaz for Total Test Plugin version 2.4.8 and earlier are affected by CVE-2022-43428.
CVE-2022-43428 has a severity rating of 5.3, which is considered medium.
An attacker who can control agent processes can exploit CVE-2022-43428 to obtain the values of Java system properties from the Jenkins controller process.
No, Jenkins Jenkins version 2.303.2 is not vulnerable to CVE-2022-43428.