Improper Restriction of XML External Entity Reference in Jenkins JUnit Plugin
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Feb 9, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jun 30, 2022
Last updated
Jan 27, 2023
Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
References