Skip to main content

CVE-2022-43428: Vulnerability in Jenkins project Jenkins Compuware Topaz for Total Test Plugin

Medium
VulnerabilityCVE-2022-43428cvecve-2022-43428
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Jenkins project
Product: Jenkins Compuware Topaz for Total Test Plugin

Description

Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.

AI-Powered Analysis

AILast updated: 07/05/2025, 04:40:17 UTC

Technical Analysis

CVE-2022-43428 is a medium severity vulnerability affecting the Jenkins Compuware Topaz for Total Test Plugin, version 2.4.8 and earlier. The vulnerability arises from the plugin's implementation of an agent/controller communication message that lacks proper execution scope restrictions. Specifically, this flaw allows an attacker who has control over Jenkins agent processes to execute this message in a way that retrieves Java system property values from the Jenkins controller process. Since Jenkins operates on a master-agent architecture, the controller (master) manages the build pipeline and holds sensitive configuration and environment information. By exploiting this vulnerability, an attacker with access to an agent can escalate their visibility into the controller's environment, potentially exposing sensitive data such as system properties that may include credentials, configuration details, or other sensitive runtime parameters. The vulnerability is classified under CWE-610, which relates to improper restriction of where code can be executed, leading to unauthorized information disclosure. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), with no impact on integrity or availability. There are no known exploits in the wild reported, and no official patches or mitigation links were provided in the source information. The vulnerability was published on October 19, 2022, and has been enriched by CISA, indicating recognition by US cybersecurity authorities. This vulnerability is particularly relevant in environments where Jenkins is used for continuous integration and deployment, and where the Compuware Topaz for Total Test Plugin is installed, as it could lead to unauthorized disclosure of sensitive system properties from the controller node by an attacker who has compromised or controls an agent node.

Potential Impact

For European organizations, the impact of CVE-2022-43428 can be significant in environments that rely on Jenkins for software development pipelines, especially those using the Compuware Topaz for Total Test Plugin. The exposure of Java system properties from the Jenkins controller can lead to leakage of sensitive information such as environment variables, configuration parameters, or credentials that may be stored as system properties. This information disclosure can facilitate further attacks, including lateral movement within the network, privilege escalation, or compromise of other systems. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive data is exposed. Additionally, the vulnerability could undermine the integrity of the software development lifecycle by exposing internal build environment details to attackers, potentially enabling supply chain attacks or insertion of malicious code. Since exploitation requires control over an agent process, the initial compromise vector might be through less secure build agents or insider threats, emphasizing the need for strict agent security. The medium severity rating suggests that while the vulnerability does not directly impact system availability or integrity, the confidentiality breach can have cascading effects on organizational security posture.

Mitigation Recommendations

To mitigate CVE-2022-43428 effectively, European organizations should take the following specific actions: 1) Restrict and monitor access to Jenkins agent nodes rigorously, ensuring that only trusted and authenticated agents are allowed to connect to the controller. 2) Implement network segmentation to isolate Jenkins agents from critical infrastructure and sensitive environments to limit lateral movement if an agent is compromised. 3) Regularly audit and update Jenkins plugins, and monitor Jenkins security advisories for patches or updates addressing this vulnerability; if no patch is available, consider disabling or removing the Compuware Topaz for Total Test Plugin until a fix is released. 4) Apply the principle of least privilege to Jenkins agents, limiting their permissions and capabilities to the minimum necessary for their tasks. 5) Enable detailed logging and monitoring of Jenkins controller and agent communications to detect anomalous message executions or unauthorized access attempts. 6) Use environment variable and secret management best practices to avoid storing sensitive information in Java system properties accessible to Jenkins processes. 7) Conduct security awareness and training for DevOps teams to recognize and respond to potential compromises of build agents. These measures go beyond generic advice by focusing on securing the Jenkins architecture and plugin-specific risks, reducing the attack surface, and improving detection capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-10-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd80ea

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 4:40:17 AM

Last updated: 7/26/2025, 3:52:54 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats