Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1000056

Опубликовано: 05 фев. 2018
Источник: redhat
CVSS3: 7.1

Описание

Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Enterprise 3jenkins-plugin-junitWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-611
https://bugzilla.redhat.com/show_bug.cgi?id=1542723jenkins-plugin-junit: XML External Entity (XXE) via a maliciously crafted file

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
nvd
почти 8 лет назад

Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVSS3: 8.3
github
больше 3 лет назад

Improper Restriction of XML External Entity Reference in Jenkins JUnit Plugin

7.1 High

CVSS3