CVE-2022-25208 – org.jenkins-ci.plugins:sinatra-chef-builder
Package
Manager: maven
Name: org.jenkins-ci.plugins:sinatra-chef-builder
Vulnerable Version: >=0 <=1.20
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00959 pctl0.75591
Details
Missing permission checks in Jenkins Chef Sinatra Plugin allow XXE Jenkins Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse the response as XML. As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Metadata
Created: 2022-02-16T00:01:15Z
Modified: 2023-10-27T16:47:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-fq56-c7rj-j3j9/GHSA-fq56-c7rj-j3j9.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-fq56-c7rj-j3j9
Finding: F039
Auto approve: 1