Lucene search

K
githubGitHub Advisory DatabaseGHSA-G4C3-4F3V-84X8
HistoryJul 12, 2023 - 6:30 p.m.

Jenkins External Monitor Job Type Plugin XML external entity vulnerability

2023-07-1218:30:38
CWE-611
GitHub Advisory Database
github.com
14
jenkins
external monitor job type plugin
xml
entity vulnerability
xxe
http request
server-side request forgery

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

21.3%

Jenkins External Monitor Job Type Plugin 206.v9a_94ff0b_4a_10 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers with Item/Build permission to have Jenkins parse a crafted HTTP request with XML data that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

External Monitor Job Type Plugin 207.v98a_a_37a_85525 disables external entity resolution for its XML parser.

Affected configurations

Vulners
Node
org.jenkins-ci.pluginsexternal-monitor-jobRange<207.v98a
VendorProductVersionCPE
org.jenkins-ci.pluginsexternal-monitor-job*cpe:2.3:a:org.jenkins-ci.plugins:external-monitor-job:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

21.3%