logo

CVE-2022-28154 org.jenkins-ci.plugins:covcomplplot

Package

Manager: maven
Name: org.jenkins-ci.plugins:covcomplplot
Vulnerable Version: >=0 <=1.1.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.09171 pctl0.92382

Details

enkins Coverage/Complexity Scatter Plot Plugin XML External Entity Reference vulnerability Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control the input files for the 'Public Coverage / Complexity Scatter Plot' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. As of publication of this advisory, there is no fix.

Metadata

Created: 2022-03-30T00:00:23Z
Modified: 2023-10-27T19:23:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-8rx6-v5q4-xw3j/GHSA-8rx6-v5q4-xw3j.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-8rx6-v5q4-xw3j
Finding: F083
Auto approve: 1