Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1jNG1wLWgzbTItaDVtY84AAXQb
Jenkins CCM Plugin vulnerable to Improper Restriction of XML External Entity Reference
Jenkins CCM Plugin 3.1 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
Permalink: https://github.com/advisories/GHSA-c4mp-h3m2-h5mcJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jNG1wLWgzbTItaDVtY84AAXQb
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: 4 months ago
CVSS Score: 8.3
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
Identifiers: GHSA-c4mp-h3m2-h5mc, CVE-2018-1000054
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000054
- https://jenkins.io/security/advisory/2018-02-05/
- https://github.com/advisories/GHSA-c4mp-h3m2-h5mc
Affected Packages
maven:org.jvnet.hudson.plugins:ccm
Versions: < 3.2Fixed in: 3.2