GHSA-g43x-pcc9-f472

Suggest an improvement
Source
https://github.com/advisories/GHSA-g43x-pcc9-f472
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-g43x-pcc9-f472/GHSA-g43x-pcc9-f472.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g43x-pcc9-f472
Aliases
  • CVE-2022-41226
Published
2022-09-22T00:00:28Z
Modified
2024-02-16T08:25:02.226059Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N CVSS Calculator
Summary
Jenkins Compuware Common Configuration Plugin vulnerable to Improper Restriction of XML External Entity Reference
Details

Jenkins Compuware Common Configuration Plugin 1.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to change the contents of the Topaz Workbench CLI home directory on agents to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Database specific
{
    "nvd_published_at": "2022-09-21T16:15:00Z",
    "cwe_ids": [
        "CWE-611"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-09-23T13:29:17Z"
}
References

Affected packages

Maven / com.compuware.jenkins:compuware-common-configuration

Package

Name
com.compuware.jenkins:compuware-common-configuration
View open source insights on deps.dev
Purl
pkg:maven/com.compuware.jenkins/compuware-common-configuration

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.15

Affected versions

1.*

1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.0.10
1.0.11
1.0.12
1.0.13
1.0.14

Database specific

{
    "last_known_affected_version_range": "<= 1.0.14"
}