Skip to main content

CVE-2022-43423: Vulnerability in Jenkins project Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin

Medium
VulnerabilityCVE-2022-43423cvecve-2022-43423
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Jenkins project
Product: Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin

Description

Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.

AI-Powered Analysis

AILast updated: 07/05/2025, 05:12:43 UTC

Technical Analysis

CVE-2022-43423 is a vulnerability identified in the Jenkins Compuware Source Code Download plugin for Endevor, PDS, and ISPW, specifically versions 2.0.12 and earlier. This plugin facilitates integration between Jenkins and mainframe source code management tools, enabling automated source code downloads. The vulnerability arises from the plugin's implementation of an agent/controller message that lacks proper restrictions on where it can be executed. As a result, an attacker who can control Jenkins agent processes can exploit this flaw to retrieve Java system property values from the Jenkins controller process. These properties may contain sensitive configuration details or environment variables that could aid further attacks or information disclosure. The vulnerability is classified under CWE-610, which relates to improper restriction of operations within the system. The CVSS v3.1 base score is 5.3 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:L) without affecting integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects Jenkins environments using this specific plugin, which is typically employed in organizations integrating mainframe source code management with CI/CD pipelines.

Potential Impact

For European organizations, the impact of CVE-2022-43423 depends largely on their use of Jenkins with the Compuware Source Code Download plugin. Organizations leveraging mainframe development environments such as Endevor, PDS, or ISPW integrated into Jenkins pipelines could be at risk. The vulnerability allows attackers who have compromised or can control Jenkins agents to extract Java system properties from the Jenkins controller, potentially exposing sensitive configuration data, credentials, or environment variables. This information disclosure could facilitate further lateral movement, privilege escalation, or targeted attacks within the CI/CD infrastructure. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can undermine trust in the build environment and lead to exposure of proprietary or sensitive development information. Given the critical role of Jenkins in software delivery, especially in regulated industries prevalent in Europe (e.g., finance, automotive, telecommunications), exploitation could disrupt secure development processes and compliance requirements. However, the medium severity and requirement for agent control limit the immediate risk to organizations with strong internal network segmentation and agent security controls.

Mitigation Recommendations

To mitigate CVE-2022-43423 effectively, European organizations should: 1) Immediately audit Jenkins environments to identify usage of the Compuware Source Code Download plugin and determine plugin versions. 2) Restrict and monitor access to Jenkins agents, ensuring that only trusted and authenticated agents are permitted to connect to the controller. 3) Implement network segmentation and firewall rules to limit agent-controller communication to authorized endpoints. 4) Review and harden Jenkins controller configurations to minimize exposure of sensitive Java system properties, including environment variables and system parameters. 5) Employ runtime monitoring and anomaly detection on Jenkins agents to detect unauthorized control or suspicious activity. 6) Engage with the Jenkins community or vendor to obtain and apply patches or updates addressing this vulnerability as soon as they become available. 7) Consider temporary disabling or replacing the vulnerable plugin if feasible until a patch is released. 8) Educate DevOps and security teams about the risks of agent compromise and enforce strict credential management and least privilege principles within CI/CD pipelines.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-10-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd8275

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 5:12:43 AM

Last updated: 7/31/2025, 4:47:37 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats