GHSA-5gwh-r76w-934h

Suggest an improvement
Source
https://github.com/advisories/GHSA-5gwh-r76w-934h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-5gwh-r76w-934h/GHSA-5gwh-r76w-934h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5gwh-r76w-934h
Aliases
  • CVE-2023-6149
Published
2024-01-09T09:30:29Z
Modified
2024-02-18T05:35:48.625436Z
Severity
  • 5.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Qualys Jenkins Plugin for WAS XML External Entity vulnerability
Details

Qualys Jenkins Plugin for WAS prior to version and including 2.0.11 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data

Database specific
{
    "nvd_published_at": "2024-01-09T09:15:42Z",
    "cwe_ids": [
        "CWE-611"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-09T19:26:01Z"
}
References

Affected packages

Maven / com.qualys.plugins:qualys-was

Package

Name
com.qualys.plugins:qualys-was
View open source insights on deps.dev
Purl
pkg:maven/com.qualys.plugins/qualys-was

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.12

Affected versions

2.*

2.0.3
2.0.4
2.0.5
2.0.6
2.0.7
2.0.8
2.0.9
2.0.10
2.0.11

Database specific

{
    "last_known_affected_version_range": "<= 2.0.11"
}