Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/10/19/3 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2622 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2022/10/19/3 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2622 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2022/10/19/3 - Mailing List, Third Party Advisory | |
References | () https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2622 - Vendor Advisory |
20 Oct 2022, 18:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:compuware_source_code_download_for_endevor\,_pds\,_and_ispw:*:*:*:*:*:jenkins:*:* cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/10/19/3 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2622 - Vendor Advisory | |
CWE | NVD-CWE-noinfo |
19 Oct 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-19 16:15
Updated : 2024-11-21 07:26
NVD link : CVE-2022-43423
Mitre link : CVE-2022-43423
CVE.ORG link : CVE-2022-43423
JSON object : View
Products Affected
jenkins
- jenkins
- compuware_source_code_download_for_endevor\,_pds\,_and_ispw
CWE