Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14OTJ2LXh2M3gtOXYyOc0sKw
CSRF vulnerability in Jenkins Chef Sinatra Plugin allow XXE
Jenkins Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse the response as XML.
As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Permalink: https://github.com/advisories/GHSA-x92v-xv3x-9v29JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14OTJ2LXh2M3gtOXYyOc0sKw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: 6 months ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-x92v-xv3x-9v29, CVE-2022-25207
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-25207
- https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1377
- http://www.openwall.com/lists/oss-security/2022/02/15/2
- https://github.com/advisories/GHSA-x92v-xv3x-9v29
Affected Packages
maven:org.jenkins-ci.plugins:sinatra-chef-builder
Affected Version Ranges: <= 1.20No known fixed version