Lucene search

K
githubGitHub Advisory DatabaseGHSA-VHWV-8897-JM7Q
HistoryOct 19, 2022 - 7:00 p.m.

XXE vulnerability in Jenkins Compuware Topaz for Total Test Plugin

2022-10-1919:00:18
CWE-611
GitHub Advisory Database
github.com
10
jenkins
compuware topaz
xxe vulnerability
total test plugin
xml parser
security issue

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

52.5%

Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control the input files for the ‘Topaz for Total Test - Execute Total Test scenarios’ build step to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Affected configurations

Vulners
Node
jenkinscompuware_topaz_for_total_testRange2.4.8jenkins

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

52.5%

Related for GHSA-VHWV-8897-JM7Q