{"id":"CVE-2022-36898","details":"A missing permission check in Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.","aliases":["GHSA-cp5r-xqjr-84gm"],"modified":"2026-03-17T14:27:02.481492Z","published":"2022-07-27T15:15:09.667Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/07/27/1"},{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2628"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/compuware-ispw-operations-plugin","events":[{"introduced":"0"},{"last_affected":"22e9b99015f488aa40018ddda1c261eb5b50b2d0"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.0.8"}]}}],"versions":["compuware_ispw_restapi_request-1.0.0","compuware_ispw_restapi_request-1.0.1","compuware_ispw_restapi_request-1.0.2","compuware_ispw_restapi_request-1.0.3","compuware_ispw_restapi_request-1.0.4","compuware_ispw_restapi_request-1.0.5","compuware_ispw_restapi_request-1.0.6","compuware_ispw_restapi_request-1.0.7","compuware_ispw_restapi_request-1.0.8","http_request-1.0","http_request-1.1","http_request-1.2","http_request-1.3","http_request-1.4","http_request-1.5","http_request-1.6","http_request-1.7","http_request-1.8","http_request-1.8.1","http_request-1.8.10","http_request-1.8.11","http_request-1.8.12","http_request-1.8.13","http_request-1.8.14","http_request-1.8.15","http_request-1.8.16","http_request-1.8.17","http_request-1.8.18","http_request-1.8.19","http_request-1.8.2","http_request-1.8.20","http_request-1.8.21","http_request-1.8.3","http_request-1.8.4","http_request-1.8.5","http_request-1.8.6","http_request-1.8.7","http_request-1.8.8","http_request-1.8.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36898.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}