GHSA-fq56-c7rj-j3j9

Suggest an improvement
Source
https://github.com/advisories/GHSA-fq56-c7rj-j3j9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-fq56-c7rj-j3j9/GHSA-fq56-c7rj-j3j9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-fq56-c7rj-j3j9
Aliases
Published
2022-02-16T00:01:15Z
Modified
2024-02-16T08:10:31.826900Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Missing permission checks in Jenkins Chef Sinatra Plugin allow XXE
Details

Jenkins Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation.

This allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse the response as XML.

As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Database specific
{
    "nvd_published_at": "2022-02-15T17:15:00Z",
    "cwe_ids": [
        "CWE-862"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-12-01T22:13:28Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:sinatra-chef-builder

Package

Name
org.jenkins-ci.plugins:sinatra-chef-builder
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/sinatra-chef-builder

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.20

Affected versions

1.*

1.3
1.14
1.15
1.20