[JENKINS:SECURITY-2805] XXE vulnerability in `rqm-plugin`

Severity Medium
Affected Packages 2
CVEs 1

rqm-plugin 2.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to provide crafted API responses from Rational Quality Manager to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

As of publication of this advisory, there is no fix.

ID
JENKINS:SECURITY-2805
Severity
medium
Published
2022-09-21T00:00:00
(2 years ago)
Modified
2022-09-21T00:00:00
(2 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository rqm-plugin repository https://github.com/jenkinsci/rqm-plugin-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/rqm-plugin org.jenkins-ci.plugins rqm-plugin <= 2.8
Affected pkg:github/jenkinsci/rqm-plugin-plugin jenkinsci rqm-plugin-plugin <= 2.8
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...