Jenkins Crap4J Plugin vulnerable to XML external entity (XXE) attacks
High severity
GitHub Reviewed
Published
Apr 2, 2023
to the GitHub Advisory Database
•
Updated Apr 18, 2023
Description
Published by the National Vulnerability Database
Apr 2, 2023
Published to the GitHub Advisory Database
Apr 2, 2023
Reviewed
Apr 3, 2023
Last updated
Apr 18, 2023
Jenkins Crap4J Plugin 0.9 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control Crap Report file contents to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
References