GHSA-cphv-7cxw-5hcc

Suggest an improvement
Source
https://github.com/advisories/GHSA-cphv-7cxw-5hcc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-cphv-7cxw-5hcc/GHSA-cphv-7cxw-5hcc.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cphv-7cxw-5hcc
Aliases
Published
2022-05-24T19:03:11Z
Modified
2024-02-16T08:06:28.696737Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
XXE vulnerability in Jenkins Filesystem Trigger Plugin
Details

Jenkins Filesystem Trigger Plugin 0.40 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers with Job/Configure permission or otherwise able to control the contents of an XML file being polled for changes to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the polling Jenkins controller or agent, server-side request forgery, or denial-of-service attacks.

Jenkins Filesystem Trigger Plugin 0.41 disables external entity resolution for its XML parser.

References

Affected packages

Maven / org.jenkins-ci.plugins:fstrigger

Package

Name
org.jenkins-ci.plugins:fstrigger
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/fstrigger

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.41

Affected versions

0.*

0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0.10
0.10.1
0.11
0.12
0.13
0.14
0.15
0.16
0.17
0.18
0.19
0.20
0.21
0.22
0.23
0.24
0.25
0.26
0.27
0.28
0.29
0.30
0.31
0.32
0.33
0.34
0.35
0.36
0.37
0.38
0.39
0.40

Database specific

{
    "last_known_affected_version_range": "<= 0.40"
}