CVE-2022-28154 – org.jenkins-ci.plugins:covcomplplot
Package
Manager: maven
Name: org.jenkins-ci.plugins:covcomplplot
Vulnerable Version: >=0 <=1.1.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.09171 pctl0.92382
Details
enkins Coverage/Complexity Scatter Plot Plugin XML External Entity Reference vulnerability Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control the input files for the 'Public Coverage / Complexity Scatter Plot' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. As of publication of this advisory, there is no fix.
Metadata
Created: 2022-03-30T00:00:23Z
Modified: 2023-10-27T19:23:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-8rx6-v5q4-xw3j/GHSA-8rx6-v5q4-xw3j.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-8rx6-v5q4-xw3j
Finding: F083
Auto approve: 1