Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1nNmgyLTR4NjQtYzU5eM4AAg9r

Improper Restriction of XML External Entity Reference Jenkins Token Macro Plugin

An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin 2.7 and earlier allowed attackers able to control a the content of the input file for the "XML" macro to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks.

Permalink: https://github.com/advisories/GHSA-g6h2-4x64-c59x
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nNmgyLTR4NjQtYzU5eM4AAg9r
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 4 months ago


CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-g6h2-4x64-c59x, CVE-2019-10337
References: Repository: https://github.com/jenkinsci/token-macro-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:oken-macro
Affected Version Ranges: <= 2.7
Fixed in: 2.8