GHSA-qf4p-7gqc-x6jx

Suggest an improvement
Source
https://github.com/advisories/GHSA-qf4p-7gqc-x6jx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-qf4p-7gqc-x6jx/GHSA-qf4p-7gqc-x6jx.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-qf4p-7gqc-x6jx
Aliases
  • CVE-2022-36895
Published
2022-07-28T00:00:42Z
Modified
2024-01-05T16:31:15.209346Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Jenkins Compuware Topaz Utilities Plugin is missing authorization
Details

Jenkins Compuware Topaz Utilities Plugin 1.0.8 and earlier does not perform permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins. Those credentials IDs can be used as part of an attack to capture the credentials using another vulnerability.

Compuware Topaz Utilities Plugin 1.0.9 requires the appropriate permissions to enumerate hosts and ports of Compuware configurations and credentials IDs.

Database specific
{
    "nvd_published_at": "2022-07-27T15:15:00Z",
    "cwe_ids": [
        "CWE-862"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-08-10T21:14:01Z"
}
References

Affected packages

Maven / com.compuware.jenkins:compuware-topaz-utilities

Package

Name
com.compuware.jenkins:compuware-topaz-utilities
View open source insights on deps.dev
Purl
pkg:maven/com.compuware.jenkins/compuware-topaz-utilities

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.9

Affected versions

1.*

1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8

Database specific

{
    "last_known_affected_version_range": "<= 1.0.8"
}