Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7185 | Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process. |
Github GHSA |
GHSA-xp3r-9wx8-q2mm | Agent-to-controller security bypass vulnerabilities in Jenkins Compuware Topaz for Total Test Plugin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 08 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-610 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-05-08T19:01:35.549Z
Reserved: 2022-10-18T00:00:00.000Z
Link: CVE-2022-43428
Updated: 2024-08-03T13:32:58.990Z
Status : Modified
Published: 2022-10-19T16:15:11.673
Modified: 2025-05-08T19:15:55.470
Link: CVE-2022-43428
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA