Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/10/19/3 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2624 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
03 Nov 2023, 01:39
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
25 Oct 2023, 18:17
Type | Values Removed | Values Added |
---|---|---|
CWE |
31 Jan 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:jenkins:*:* | |
First Time |
Jenkins compuware Topaz For Total Test
|
22 Oct 2022, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/10/19/3 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2624 - Vendor Advisory | |
First Time |
Jenkins jenkins
Jenkins compuware Topax For Total Test Jenkins |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:a:jenkins:compuware_topax_for_total_test:*:*:*:*:*:jenkins:*:* cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:* |
19 Oct 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Oct 2022, 16:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-19 16:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-43428
Mitre link : CVE-2022-43428
CVE.ORG link : CVE-2022-43428
JSON object : View
Products Affected
jenkins
- compuware_topaz_for_total_test
- jenkins
CWE