GHSA-8538-25v4-25pg

Suggest an improvement
Source
https://github.com/advisories/GHSA-8538-25v4-25pg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-8538-25v4-25pg/GHSA-8538-25v4-25pg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8538-25v4-25pg
Aliases
  • CVE-2022-45400
Published
2022-11-16T12:00:23Z
Modified
2023-11-08T04:10:52.780310Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N CVSS Calculator
Summary
XXE vulnerability in Jenkins JAPEX Plugin
Details

JAPEX Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control XML input files for the 'Record Japex test report' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Database specific
{
    "nvd_published_at": "2022-11-15T20:15:00Z",
    "github_reviewed_at": "2022-11-21T22:26:29Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-611"
    ]
}
References

Affected packages

Maven / org.jvnet.hudson.plugins:japex

Package

Name
org.jvnet.hudson.plugins:japex
View open source insights on deps.dev
Purl
pkg:maven/org.jvnet.hudson.plugins/japex

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.7

Affected versions

1.*

1.3
1.4
1.5
1.6
1.7