Описание
Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenShift Enterprise 3 | jenkins-plugin-junit | Will not fix |
Показывать по
10
Дополнительная информация
Статус:
Moderate
Дефект:
CWE-611
https://bugzilla.redhat.com/show_bug.cgi?id=1542723jenkins-plugin-junit: XML External Entity (XXE) via a maliciously crafted file
7.1 High
CVSS3
Связанные уязвимости
CVSS3: 8.3
nvd
почти 8 лет назад
Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
CVSS3: 8.3
github
больше 3 лет назад
Improper Restriction of XML External Entity Reference in Jenkins JUnit Plugin
7.1 High
CVSS3