CVE-2022-36898

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-36898
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36898.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-36898
Aliases
Published
2022-07-27T15:15:09Z
Modified
2024-10-12T09:59:29.764205Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

A missing permission check in Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.

References

Affected packages

Git / github.com/jenkinsci/compuware-ispw-operations-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/compuware-ispw-operations-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

compuware_ispw_restapi_request-1.*

compuware_ispw_restapi_request-1.0.0
compuware_ispw_restapi_request-1.0.1
compuware_ispw_restapi_request-1.0.2
compuware_ispw_restapi_request-1.0.3
compuware_ispw_restapi_request-1.0.4
compuware_ispw_restapi_request-1.0.5
compuware_ispw_restapi_request-1.0.6
compuware_ispw_restapi_request-1.0.7
compuware_ispw_restapi_request-1.0.8

http_request-1.*

http_request-1.0
http_request-1.1
http_request-1.2
http_request-1.3
http_request-1.4
http_request-1.5
http_request-1.6
http_request-1.7
http_request-1.8
http_request-1.8.1
http_request-1.8.10
http_request-1.8.11
http_request-1.8.12
http_request-1.8.13
http_request-1.8.14
http_request-1.8.15
http_request-1.8.16
http_request-1.8.17
http_request-1.8.18
http_request-1.8.19
http_request-1.8.2
http_request-1.8.20
http_request-1.8.21
http_request-1.8.3
http_request-1.8.4
http_request-1.8.5
http_request-1.8.6
http_request-1.8.7
http_request-1.8.8
http_request-1.8.9