GHSA-34j5-c4cv-mmg5

Suggest an improvement
Source
https://github.com/advisories/GHSA-34j5-c4cv-mmg5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-34j5-c4cv-mmg5/GHSA-34j5-c4cv-mmg5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-34j5-c4cv-mmg5
Aliases
Published
2022-05-24T19:03:11Z
Modified
2024-02-16T08:01:44.372038Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
XXE vulnerability in Jenkins URLTrigger Plugin
Details

Jenkins URLTrigger Plugin 0.48 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers with Job/Configure permission or otherwise able to control the contents of an URL to an XML document being examined for changes to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the polling Jenkins controller or agent, server-side request forgery, or denial-of-service attacks.

UJenkins RLTrigger Plugin 0.49 disables external entity resolution for its XML parser.

Database specific
{
    "nvd_published_at": "2021-05-25T17:15:00Z",
    "cwe_ids": [
        "CWE-611"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-12-15T17:33:55Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:urltrigger

Package

Name
org.jenkins-ci.plugins:urltrigger
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/urltrigger

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.49

Affected versions

0.*

0.1
0.2
0.3
0.4
0.4.1
0.4.2
0.4.3
0.5
0.5.1
0.6
0.7
0.8
0.9
0.10
0.11
0.13
0.14
0.15
0.16
0.17
0.18
0.19
0.20
0.21
0.22
0.23
0.24
0.25
0.26
0.27
0.28
0.29
0.30
0.31
0.32
0.33
0.34
0.35
0.36
0.37
0.38
0.39
0.40
0.41
0.43
0.44
0.45
0.46
0.47
0.48

Database specific

{
    "last_known_affected_version_range": "<= 0.48"
}