[JENKINS:SECURITY-2292] XXE vulnerability on agents in `mstest`

Severity Medium
Affected Packages 2
CVEs 1

mstest 1.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control the contents of the report file for the 'Publish MSTest test result report' post-build step to have agent processes parse a crafted file that uses external entities for extraction of secrets from the Jenkins agent or server-side request forgery.

NOTE: Because Jenkins agent processes usually execute build tools whose input (source code, build scripts, etc.) is controlled externally, this vulnerability only has a real impact in very narrow circumstances: when attackers can control XML files, but are unable to change build steps, Jenkinsfiles, test code that gets executed on the agents, or similar.

As of publication of this advisory, there is no fix.

ID
JENKINS:SECURITY-2292
Severity
medium
Published
2023-01-24T00:00:00
(20 months ago)
Modified
2023-01-24T00:00:00
(20 months ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository mstest repository https://github.com/jenkinsci/mstest-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/mstest org.jenkins-ci.plugins mstest <= 1.0.0
Affected pkg:github/jenkinsci/mstest-plugin jenkinsci mstest-plugin <= 1.0.0
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...