File Reading Vulnerability in Jenkins Compuware Topaz for Total Test Plugin
CVE-2022-43429

7.5HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
19 October 2022

Summary

The Jenkins Compuware Topaz for Total Test Plugin prior to version 2.4.9 allows unrestricted execution of agent/controller messages, enabling attackers with control over agent processes to access and read arbitrary files from the Jenkins controller file system. This results in a significant security risk, as sensitive information could be exposed if exploited.

Affected Version(s)

Jenkins Compuware Topaz for Total Test Plugin <= 2.4.8

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.