logo

CVE-2022-30971 org.jvnet.hudson.plugins:storable-configs-plugin

Package

Manager: maven
Name: org.jvnet.hudson.plugins:storable-configs-plugin
Vulnerable Version: >=0 <=1.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0163 pctl0.81183

Details

XML External Entity Reference in Jenkins Storable Configs Plugin Jenkins Storable Configs Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers with Item/Configure permission to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Metadata

Created: 2022-05-18T00:00:42Z
Modified: 2022-12-02T20:07:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wqmp-2p5r-rhfv/GHSA-wqmp-2p5r-rhfv.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-wqmp-2p5r-rhfv
Finding: F083
Auto approve: 1