logo

CVE-2020-2324 org.jenkins-ci.plugins:cvs

Package

Manager: maven
Name: org.jenkins-ci.plugins:cvs
Vulnerable Version: >=0 <2.17

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00147 pctl0.35718

Details

XXE vulnerability in Jenkins CVS Plugin Jenkins CVS Plugin 2.16 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control an agent process to have Jenkins parse a crafted changelog file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. Jenkins CVS Plugin 2.17 disables external entity resolution for its XML parser.

Metadata

Created: 2022-05-24T17:35:09Z
Modified: 2023-10-27T13:17:26Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-g9hg-x9c9-7xgr/GHSA-g9hg-x9c9-7xgr.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-g9hg-x9c9-7xgr
Finding: F083
Auto approve: 1