First published: Wed Oct 19 2022(Updated: )
Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control the input files for the 'Topaz for Total Test - Execute Total Test scenarios' build step to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Compuware Topaz For Total Test | <=2.4.8 | |
maven/com.compuware.jenkins:compuware-topaz-for-total-test | <=2.4.8 | 2.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-43430.
The title of this vulnerability is Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
The severity of CVE-2022-43430 is high with a CVSS score of 7.5.
Jenkins Compuware Topaz for Total Test Plugin versions 2.4.8 and earlier are affected by CVE-2022-43430.
To fix CVE-2022-43430, you should update Jenkins Compuware Topaz for Total Test Plugin to a version beyond 2.4.8.