Lucene search

K
githubGitHub Advisory DatabaseGHSA-H8P8-6378-649P
HistoryJan 26, 2023 - 9:30 p.m.

XML external entity reference vulnerability on agents in Jenkins Semantic Versioning Plugin

2023-01-2621:30:18
CWE-611
GitHub Advisory Database
github.com
8
xml
entity vulnerability
jenkins
semantic versioning plugin
software

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.1%

Jenkins Semantic Versioning Plugin 1.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchjdk_parameter_plugin

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.1%

Related for GHSA-H8P8-6378-649P