GHSA-ppv9-v43c-xqpp

Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-ppv9-v43c-xqpp/GHSA-ppv9-v43c-xqpp.json
Aliases
  • CVE-2021-43576
Published
2022-05-24T19:20:33Z
Modified
2023-03-18T05:55:39.526693Z
Details

pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

As of publication of this advisory, there is no fix.

References

Affected packages

Maven / org.jenkins-ci.plugins:pom2config

org.jenkins-ci.plugins:pom2config

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0

Affected versions

1.*

1.2

Database specific

{
    "last_known_affected_version_range": "<= 1.2"
}