XML External Entity Processing Vulnerability in Jenkins Self-Organizing Swarm Plug-in Modules
CVE-2019-10309

9.3CRITICAL

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
30 April 2019

Summary

The Jenkins Self-Organizing Swarm Plug-in Modules contains a vulnerability that allows clients leveraging UDP broadcasts for discovering Jenkins masters to process XML External Entities. This flaw enables unauthorized attackers on the same network to read arbitrary files from Swarm clients, potentially leading to data exposure and confidentiality breaches. Addressing this vulnerability is crucial for maintaining the security of Jenkins installations and protecting sensitive information.

Affected Version(s)

Jenkins Self-Organizing Swarm Plug-in Modules Plugin 3.15 and earlier

References

CVSS V3.1

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.