GHSA-j8xr-2279-88qj

Suggest an improvement
Source
https://github.com/advisories/GHSA-j8xr-2279-88qj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-j8xr-2279-88qj/GHSA-j8xr-2279-88qj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-j8xr-2279-88qj
Aliases
  • CVE-2022-41241
Published
2022-09-22T00:00:28Z
Modified
2023-11-08T04:10:28.447913Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N CVSS Calculator
Summary
Jenkins RQM Plugin vulnerable to Improper Restriction of XML External Entity Reference
Details

Jenkins RQM Plugin 2.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to provide crafted API responses from Rational Quality Manager to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. There is currently no known workaround or fix for this issue.

Database specific
{
    "nvd_published_at": "2022-09-21T16:15:00Z",
    "github_reviewed_at": "2022-09-23T13:36:52Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-611"
    ]
}
References

Affected packages

Maven / net.praqma:rqm-plugin

Package

Name
net.praqma:rqm-plugin
View open source insights on deps.dev
Purl
pkg:maven/net.praqma/rqm-plugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.8

Affected versions

1.*

1.0

2.*

2.0
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8