CVE-2023-6149 – com.qualys.plugins:qualys-was
Package
Manager: maven
Name: com.qualys.plugins:qualys-was
Vulnerable Version: >=0 <2.0.12
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00186 pctl0.406
Details
Qualys Jenkins Plugin for WAS XML External Entity vulnerability Qualys Jenkins Plugin for WAS prior to version and including 2.0.11 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data
Metadata
Created: 2024-01-09T09:30:29Z
Modified: 2024-01-09T19:26:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-5gwh-r76w-934h/GHSA-5gwh-r76w-934h.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-5gwh-r76w-934h
Finding: F083
Auto approve: 1