Jenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2415 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2021/11/12/1 | Mailing List Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-1314/ | Third Party Advisory |
Configurations
Information
Published : 2021-11-12 03:15
Updated : 2021-11-16 17:17
NVD link : CVE-2021-43576
Mitre link : CVE-2021-43576
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
jenkins
- pom2config