Jenkins CCM Plugin vulnerable to Improper Restriction of XML External Entity Reference
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Feb 2, 2023
Description
Published by the National Vulnerability Database
Feb 9, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Nov 22, 2022
Last updated
Feb 2, 2023
Jenkins CCM Plugin 3.1 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
References