PT-2022-26914 · Compuware +1 · Topaz For Total Test Plugin +1

Kevin Guerroudj

·

Published

2022-10-19

·

Updated

2023-11-22

·

CVE-2022-43430

CVSS v3.1
7.5
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Name of the Vulnerable Software and Affected Versions:

Jenkins Compuware Topaz for Total Test Plugin versions 2.4.8 and earlier

Description:

The issue arises from the plugin not configuring its XML parser to prevent XML external entity (XXE) attacks. This allows attackers who can control the input files for the 'Topaz for Total Test - Execute Total Test scenarios' build step to have Jenkins parse a crafted XML document, potentially leading to the extraction of secrets from the Jenkins controller or server-side request forgery.

Recommendations:

For versions 2.4.8 and earlier, update to a version that configures its XML parser to prevent XXE attacks.

As a temporary workaround, consider restricting access to the 'Topaz for Total Test - Execute Total Test scenarios' build step to minimize the risk of exploitation.

Fix

XXE

Weakness Enumeration

Related Identifiers

CVE-2022-43430
GHSA-VHWV-8897-JM7Q

Affected Products

Jenkins
Topaz For Total Test Plugin