Lucene search

K
githubGitHub Advisory DatabaseGHSA-J3H2-8MF8-J5R2
HistoryJul 15, 2022 - 6:12 p.m.

Hudson XML API susceptible to External Entity Injection Vunerability prior to v3.3.2

2022-07-1518:12:47
CWE-611
GitHub Advisory Database
github.com
12

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

69.2%

In versions prior to 3.3.2, Hudson exhibits a flaw in its XML API processing that can allow access to potentially sensitive information on the filesystem of the Hudson master server.

Affected configurations

Vulners
Node
org.jvnet.hudson.main\hudsonMatchcore

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

69.2%

Related for GHSA-J3H2-8MF8-J5R2