GHSA-ppv9-v43c-xqpp

Source
https://github.com/advisories/GHSA-ppv9-v43c-xqpp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-ppv9-v43c-xqpp/GHSA-ppv9-v43c-xqpp.json
Aliases
  • CVE-2021-43576
Published
2022-05-24T19:20:33Z
Modified
2024-02-19T05:32:49.217629Z
Details

Jenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

As of publication of this advisory, there is no fix.

References

Affected packages

Maven / org.jenkins-ci.plugins:pom2config

Package

Name
org.jenkins-ci.plugins:pom2config

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Last affected
1.2

Affected versions

1.*

1.2