CVE-2022-36899

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-36899
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36899.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-36899
Aliases
Published
2022-07-27T15:15:09Z
Modified
2024-09-03T04:18:23.402148Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N CVSS Calculator
Summary
[none]
Details

Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.

References

Affected packages

Git / github.com/jenkinsci/compuware-ispw-operations-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/compuware-ispw-operations-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

compuware_ispw_restapi_request-1.*

compuware_ispw_restapi_request-1.0.0
compuware_ispw_restapi_request-1.0.1
compuware_ispw_restapi_request-1.0.2
compuware_ispw_restapi_request-1.0.3
compuware_ispw_restapi_request-1.0.4
compuware_ispw_restapi_request-1.0.5
compuware_ispw_restapi_request-1.0.6
compuware_ispw_restapi_request-1.0.7
compuware_ispw_restapi_request-1.0.8

http_request-1.*

http_request-1.0
http_request-1.1
http_request-1.2
http_request-1.3
http_request-1.4
http_request-1.5
http_request-1.6
http_request-1.7
http_request-1.8
http_request-1.8.1
http_request-1.8.10
http_request-1.8.11
http_request-1.8.12
http_request-1.8.13
http_request-1.8.14
http_request-1.8.15
http_request-1.8.16
http_request-1.8.17
http_request-1.8.18
http_request-1.8.19
http_request-1.8.2
http_request-1.8.20
http_request-1.8.21
http_request-1.8.3
http_request-1.8.4
http_request-1.8.5
http_request-1.8.6
http_request-1.8.7
http_request-1.8.8
http_request-1.8.9