logo

CVE-2018-1000056 org.jenkins-ci.plugins:junit

Package

Manager: maven
Name: org.jenkins-ci.plugins:junit
Vulnerable Version: >=0 <1.24

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00146 pctl0.35625

Details

Improper Restriction of XML External Entity Reference in Jenkins JUnit Plugin Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

Metadata

Created: 2022-05-14T03:40:06Z
Modified: 2022-06-30T19:45:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-4rj6-9pjh-882r/GHSA-4rj6-9pjh-882r.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-4rj6-9pjh-882r
Finding: F083
Auto approve: 1