[JENKINS:SECURITY-2394] XXE vulnerability in `performance`

Severity High
Affected Packages 2
CVEs 1

performance 3.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control workspace contents to have Jenkins parse a crafted XML report file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

As of publication of this advisory, there is no fix.

ID
JENKINS:SECURITY-2394
Severity
high
Published
2021-11-12T00:00:00
(2 years ago)
Modified
2021-11-12T00:00:00
(2 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository performance repository https://github.com/jenkinsci/performance-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/performance org.jenkins-ci.plugins performance <= 3.20
Affected pkg:github/jenkinsci/performance-plugin jenkinsci performance-plugin <= 3.20
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...