CVE-2021-21657 – org.jenkins-ci.plugins:fstrigger
Package
Manager: maven
Name: org.jenkins-ci.plugins:fstrigger
Vulnerable Version: >=0 <0.41
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00163 pctl0.37748
Details
XXE vulnerability in Jenkins Filesystem Trigger Plugin Jenkins Filesystem Trigger Plugin 0.40 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers with Job/Configure permission or otherwise able to control the contents of an XML file being polled for changes to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the polling Jenkins controller or agent, server-side request forgery, or denial-of-service attacks. Jenkins Filesystem Trigger Plugin 0.41 disables external entity resolution for its XML parser.
Metadata
Created: 2022-05-24T19:03:11Z
Modified: 2023-10-27T14:56:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-cphv-7cxw-5hcc/GHSA-cphv-7cxw-5hcc.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-cphv-7cxw-5hcc
Finding: F083
Auto approve: 1