Lucene search

K
githubGitHub Advisory DatabaseGHSA-XP3R-9WX8-Q2MM
HistoryOct 19, 2022 - 7:00 p.m.

Agent-to-controller security bypass vulnerabilities in Jenkins Compuware Topaz for Total Test Plugin

2022-10-1919:00:22
CWE-693
GitHub Advisory Database
github.com
13
jenkins
compuware topaz
total test plugin
security bypass
vulnerabilities
controller process
lts upgrade

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

33.5%

Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.

These vulnerabilities are only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. See the LTS upgrade guide.

Affected configurations

Vulners
Node
jenkinscompuware_topaz_for_total_testRange2.4.8jenkins

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

33.5%

Related for GHSA-XP3R-9WX8-Q2MM