Описание
Qualys Jenkins Plugin for WAS prior to version and including 2.0.11 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.0.11 (включая)
cpe:2.3:a:qualys:web_application_screening:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 44%
0.00217
Низкий
5.7 Medium
CVSS3
6.5 Medium
CVSS3
Дефекты
CWE-611
CWE-611
Связанные уязвимости
CVSS3: 5.7
github
около 2 лет назад
Qualys Jenkins Plugin for WAS XML External Entity vulnerability
EPSS
Процентиль: 44%
0.00217
Низкий
5.7 Medium
CVSS3
6.5 Medium
CVSS3
Дефекты
CWE-611
CWE-611