File Reading Vulnerability in Jenkins Compuware Topaz for Total Test Plugin
CVE-2022-43429
7.5HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 19 October 2022
Summary
The Jenkins Compuware Topaz for Total Test Plugin prior to version 2.4.9 allows unrestricted execution of agent/controller messages, enabling attackers with control over agent processes to access and read arbitrary files from the Jenkins controller file system. This results in a significant security risk, as sensitive information could be exposed if exploited.
Affected Version(s)
Jenkins Compuware Topaz for Total Test Plugin <= 2.4.8
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved