CVE-2022-36897:
Jenkins Compuware Xpediter Code Coverage Plugin Missing Authorization
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.62642%
CWE
Published
7/28/2022
Updated
1/5/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.compuware.jenkins:compuware-xpediter-code-coverage | maven | <= 1.0.7 | 1.0.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows these form validation methods were modified to add permission checks (Jenkins.ADMINISTER
or Item.CONFIGURE
). Prior to 1.0.8, these methods lacked authorization checks, matching the vulnerability description of allowing credential/host enumeration via HTTP endpoints. These are clearly the endpoints responsible for listing connection configurations and credentials.