[MAVEN:GHSA-VQ5H-QGXM-2M39] Jenkins Crap4J Plugin vulnerable to XML external entity (XXE) attacks

Severity High
Affected Packages 1
CVEs 1

Jenkins Crap4J Plugin 0.9 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control Crap Report file contents to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Package Affected Version
pkg:maven/org.jenkins-ci.plugins/crap4j <= 0.9
ID
MAVEN:GHSA-VQ5H-QGXM-2M39
Severity
high
URL
https://github.com/advisories/GHSA-vq5h-qgxm-2m39
Published
2023-04-02T21:30:17
(17 months ago)
Modified
2023-04-18T05:07:40
(17 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/crap4j org.jenkins-ci.plugins crap4j <= 0.9
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...