Jenkins External Monitor Job Type Plugin XML external entity vulnerability
Moderate severity
GitHub Reviewed
Published
Jul 12, 2023
to the GitHub Advisory Database
•
Updated Nov 7, 2023
Package
Affected versions
< 207.v98a
Patched versions
207.v98a
Description
Published by the National Vulnerability Database
Jul 12, 2023
Published to the GitHub Advisory Database
Jul 12, 2023
Reviewed
Jul 12, 2023
Last updated
Nov 7, 2023
Jenkins External Monitor Job Type Plugin 206.v9a_94ff0b_4a_10 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers with Item/Build permission to have Jenkins parse a crafted HTTP request with XML data that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
External Monitor Job Type Plugin 207.v98a_a_37a_85525 disables external entity resolution for its XML parser.
References