Vulnerability CVE-2021-43576


Published: 2021-11-12

Description:
Jenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Type:

CWE-611

(Information Exposure Through XML External Entity Reference)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Jenkins -> Pom2config 

 References:
https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2415
http://www.openwall.com/lists/oss-security/2021/11/12/1
https://www.zerodayinitiative.com/advisories/ZDI-21-1314/

Copyright 2024, cxsecurity.com

 

Back to Top