Qualys Jenkins Plugin for WAS XML External Entity vulnerability
Moderate severity
GitHub Reviewed
Published
Jan 9, 2024
to the GitHub Advisory Database
•
Updated Jan 12, 2024
Description
Published by the National Vulnerability Database
Jan 9, 2024
Published to the GitHub Advisory Database
Jan 9, 2024
Reviewed
Jan 9, 2024
Last updated
Jan 12, 2024
Qualys Jenkins Plugin for WAS prior to version and including 2.0.11 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data
References