Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS14NWd2LTVycXYtNjU0bc4AAvdH

Jenkins Compuware Topaz for Total Test Plugin allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins

Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

Permalink: https://github.com/advisories/GHSA-x5gv-5rqv-654m
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14NWd2LTVycXYtNjU0bc4AAvdH
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: 4 months ago


CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Identifiers: GHSA-x5gv-5rqv-654m, CVE-2022-43427
References: Repository: https://github.com/jenkinsci/compuware-topaz-for-total-test-plugin
Blast Radius: 1.0

Affected Packages

maven:com.compuware.jenkins:compuware-topaz-for-total-test
Affected Version Ranges: <= 2.4.8
Fixed in: 2.4.9