
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2022-43429 was discovered in Jenkins Compuware Topaz for Total Test Plugin version 2.4.8 and earlier. This security flaw involves an agent/controller message implementation that fails to restrict its execution location, potentially exposing sensitive information on the Jenkins controller file system (Jenkins Advisory, NVD). The vulnerability was disclosed on October 19, 2022, and received a CVSS v3.1 severity rating of 7.5 (High) (NVD).
The vulnerability exists in the GetRemoteUTF8FileContents agent/controller message implementation. The plugin fails to implement proper execution restrictions, allowing the message to be executed in unauthorized locations. This security flaw is specifically exploitable in Jenkins versions 2.318 and earlier, as well as LTS 2.303.2 and earlier (Jenkins Advisory).
When exploited, this vulnerability allows attackers who have control over agent processes to read arbitrary files on the Jenkins controller file system. This represents a significant security breach as it could potentially expose sensitive configuration files, credentials, and other critical system information (Jenkins Advisory).
As of the security advisory's publication on October 19, 2022, no official fix was available for this vulnerability. Organizations using the affected plugin versions should assess their risk and consider implementing additional security controls to restrict access to agent processes (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."