Описание
An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.7.0 (включая)
cpe:2.3:a:jenkins:pipeline_maven_integration:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 35%
0.00148
Низкий
8.1 High
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-611
Связанные уязвимости
CVSS3: 8.1
github
больше 3 лет назад
XML External Entity processing vulnerability in Pipeline Maven Integration Jenkins Plugin
EPSS
Процентиль: 35%
0.00148
Низкий
8.1 High
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-611