Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1nNmgyLTR4NjQtYzU5eM4AAg9r
Improper Restriction of XML External Entity Reference Jenkins Token Macro Plugin
An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin 2.7 and earlier allowed attackers able to control a the content of the input file for the "XML" macro to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks.
Permalink: https://github.com/advisories/GHSA-g6h2-4x64-c59xJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nNmgyLTR4NjQtYzU5eM4AAg9r
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: about 2 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-g6h2-4x64-c59x, CVE-2019-10337
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-10337
- https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399
- http://www.openwall.com/lists/oss-security/2019/06/11/1
- https://access.redhat.com/errata/RHSA-2019:1636
- https://access.redhat.com/errata/RHSA-2019:1851
- http://www.securityfocus.com/bid/108747
- https://github.com/jenkinsci/token-macro-plugin/commit/004319f1b6e2a0f097a096b9df9dc19a5ac0d9b0
- https://github.com/advisories/GHSA-g6h2-4x64-c59x
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:token-macro
Affected Version Ranges: <= 2.7Fixed in: 2.8