Jenkins Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse the response as XML.
As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
{ "nvd_published_at": "2022-02-15T17:15:00Z", "cwe_ids": [ "CWE-862" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-12-01T22:13:28Z" }