Lucene search

K
githubGitHub Advisory DatabaseGHSA-P674-HH8X-RV5H
HistoryMay 24, 2022 - 7:03 p.m.

XML external entity vulnerability in Jenkins Nuget Plugin

2022-05-2419:03:11
CWE-611
GitHub Advisory Database
github.com
6
jenkins
nuget plugin
xml parser
xxe
security
vulnerability
workspace
server-side requestforgery

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.002

Percentile

55.1%

Jenkins Nuget Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This XML parser is used for the "Build on NuGet updates" feature.

This allows attackers with the ability to control the contents of the packages.config file in a workspace to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Jenkins Nuget Plugin 1.1 disables external entity resolution for its XML parser.

Affected configurations

Vulners
Node
org.jenkins-ci.pluginsnugetRange<1.1
VendorProductVersionCPE
org.jenkins-ci.pluginsnuget*cpe:2.3:a:org.jenkins-ci.plugins:nuget:*:*:*:*:*:*:*:*

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.002

Percentile

55.1%

Related for GHSA-P674-HH8X-RV5H