CVE-2018-1000054 – org.jvnet.hudson.plugins:ccm
Package
Manager: maven
Name: org.jvnet.hudson.plugins:ccm
Vulnerable Version: >=0 <3.2
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:H/SI:L/SA:H
EPSS: 0.00065 pctl0.20442
Details
Jenkins CCM Plugin vulnerable to Improper Restriction of XML External Entity Reference Jenkins CCM Plugin 3.1 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
Metadata
Created: 2022-05-14T03:38:33Z
Modified: 2022-11-22T19:46:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-c4mp-h3m2-h5mc/GHSA-c4mp-h3m2-h5mc.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-c4mp-h3m2-h5mc
Finding: F083
Auto approve: 1