CVE-2022-43423: Vulnerability in Jenkins project Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin
Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
AI Analysis
Technical Summary
CVE-2022-43423 is a vulnerability identified in the Jenkins Compuware Source Code Download plugin for Endevor, PDS, and ISPW, specifically versions 2.0.12 and earlier. This plugin facilitates integration between Jenkins and mainframe source code management tools, enabling automated source code downloads. The vulnerability arises from the plugin's implementation of an agent/controller message that lacks proper restrictions on where it can be executed. As a result, an attacker who can control Jenkins agent processes can exploit this flaw to retrieve Java system property values from the Jenkins controller process. These properties may contain sensitive configuration details or environment variables that could aid further attacks or information disclosure. The vulnerability is classified under CWE-610, which relates to improper restriction of operations within the system. The CVSS v3.1 base score is 5.3 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:L) without affecting integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects Jenkins environments using this specific plugin, which is typically employed in organizations integrating mainframe source code management with CI/CD pipelines.
Potential Impact
For European organizations, the impact of CVE-2022-43423 depends largely on their use of Jenkins with the Compuware Source Code Download plugin. Organizations leveraging mainframe development environments such as Endevor, PDS, or ISPW integrated into Jenkins pipelines could be at risk. The vulnerability allows attackers who have compromised or can control Jenkins agents to extract Java system properties from the Jenkins controller, potentially exposing sensitive configuration data, credentials, or environment variables. This information disclosure could facilitate further lateral movement, privilege escalation, or targeted attacks within the CI/CD infrastructure. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can undermine trust in the build environment and lead to exposure of proprietary or sensitive development information. Given the critical role of Jenkins in software delivery, especially in regulated industries prevalent in Europe (e.g., finance, automotive, telecommunications), exploitation could disrupt secure development processes and compliance requirements. However, the medium severity and requirement for agent control limit the immediate risk to organizations with strong internal network segmentation and agent security controls.
Mitigation Recommendations
To mitigate CVE-2022-43423 effectively, European organizations should: 1) Immediately audit Jenkins environments to identify usage of the Compuware Source Code Download plugin and determine plugin versions. 2) Restrict and monitor access to Jenkins agents, ensuring that only trusted and authenticated agents are permitted to connect to the controller. 3) Implement network segmentation and firewall rules to limit agent-controller communication to authorized endpoints. 4) Review and harden Jenkins controller configurations to minimize exposure of sensitive Java system properties, including environment variables and system parameters. 5) Employ runtime monitoring and anomaly detection on Jenkins agents to detect unauthorized control or suspicious activity. 6) Engage with the Jenkins community or vendor to obtain and apply patches or updates addressing this vulnerability as soon as they become available. 7) Consider temporary disabling or replacing the vulnerable plugin if feasible until a patch is released. 8) Educate DevOps and security teams about the risks of agent compromise and enforce strict credential management and least privilege principles within CI/CD pipelines.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2022-43423: Vulnerability in Jenkins project Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin
Description
Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
AI-Powered Analysis
Technical Analysis
CVE-2022-43423 is a vulnerability identified in the Jenkins Compuware Source Code Download plugin for Endevor, PDS, and ISPW, specifically versions 2.0.12 and earlier. This plugin facilitates integration between Jenkins and mainframe source code management tools, enabling automated source code downloads. The vulnerability arises from the plugin's implementation of an agent/controller message that lacks proper restrictions on where it can be executed. As a result, an attacker who can control Jenkins agent processes can exploit this flaw to retrieve Java system property values from the Jenkins controller process. These properties may contain sensitive configuration details or environment variables that could aid further attacks or information disclosure. The vulnerability is classified under CWE-610, which relates to improper restriction of operations within the system. The CVSS v3.1 base score is 5.3 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:L) without affecting integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects Jenkins environments using this specific plugin, which is typically employed in organizations integrating mainframe source code management with CI/CD pipelines.
Potential Impact
For European organizations, the impact of CVE-2022-43423 depends largely on their use of Jenkins with the Compuware Source Code Download plugin. Organizations leveraging mainframe development environments such as Endevor, PDS, or ISPW integrated into Jenkins pipelines could be at risk. The vulnerability allows attackers who have compromised or can control Jenkins agents to extract Java system properties from the Jenkins controller, potentially exposing sensitive configuration data, credentials, or environment variables. This information disclosure could facilitate further lateral movement, privilege escalation, or targeted attacks within the CI/CD infrastructure. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can undermine trust in the build environment and lead to exposure of proprietary or sensitive development information. Given the critical role of Jenkins in software delivery, especially in regulated industries prevalent in Europe (e.g., finance, automotive, telecommunications), exploitation could disrupt secure development processes and compliance requirements. However, the medium severity and requirement for agent control limit the immediate risk to organizations with strong internal network segmentation and agent security controls.
Mitigation Recommendations
To mitigate CVE-2022-43423 effectively, European organizations should: 1) Immediately audit Jenkins environments to identify usage of the Compuware Source Code Download plugin and determine plugin versions. 2) Restrict and monitor access to Jenkins agents, ensuring that only trusted and authenticated agents are permitted to connect to the controller. 3) Implement network segmentation and firewall rules to limit agent-controller communication to authorized endpoints. 4) Review and harden Jenkins controller configurations to minimize exposure of sensitive Java system properties, including environment variables and system parameters. 5) Employ runtime monitoring and anomaly detection on Jenkins agents to detect unauthorized control or suspicious activity. 6) Engage with the Jenkins community or vendor to obtain and apply patches or updates addressing this vulnerability as soon as they become available. 7) Consider temporary disabling or replacing the vulnerable plugin if feasible until a patch is released. 8) Educate DevOps and security teams about the risks of agent compromise and enforce strict credential management and least privilege principles within CI/CD pipelines.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2022-10-18T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd8275
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 5:12:43 AM
Last updated: 7/31/2025, 4:47:37 AM
Views: 13
Related Threats
CVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.