Lucene search

K
githubGitHub Advisory DatabaseGHSA-2W2M-CCF8-57CQ
HistoryOct 19, 2022 - 7:00 p.m.

XXE vulnerability in Jenkins REPO Plugin

2022-10-1919:00:18
CWE-611
GitHub Advisory Database
github.com
11
jenkins
repo plugin
xxe
ssrf
1.15.0
1.16.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

52.6%

REPO Plugin 1.15.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control which repo binary is executed on agents to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

REPO Plugin 1.16.0 disables external entity resolution for its XML parser.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchrepo
CPENameOperatorVersion
org.jenkins-ci.plugins:repolt1.16.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

52.6%

Related for GHSA-2W2M-CCF8-57CQ