logo

CVE-2018-1000011 org.jvnet.hudson.plugins.findbugs:library

Package

Manager: maven
Name: org.jvnet.hudson.plugins.findbugs:library
Vulnerable Version: >=0 <=4.7.1

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00065 pctl0.20464

Details

XML External Entity Reference in Jenkins FindBugs Plugin Jenkins FindBugs Plugin 4.71 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

Metadata

Created: 2022-05-14T03:46:08Z
Modified: 2022-11-03T19:13:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-pr9h-g7p7-rrqh/GHSA-pr9h-g7p7-rrqh.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-pr9h-g7p7-rrqh
Finding: F083
Auto approve: 1