XML External Entity Vulnerability in Jenkins OWASP Dependency-Check Plugin
CVE-2021-43577

7.1HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 November 2021

Summary

The Jenkins OWASP Dependency-Check Plugin versions 5.1.1 and earlier are susceptible to XML External Entity (XXE) attacks. This vulnerability arises from the inadequate configuration of the XML parser, allowing attackers to exploit the parser's ability to process external entities. Such exploitation can lead to unauthorized access to sensitive data or the execution of malicious commands. Users are advised to upgrade to the latest version of the plugin to mitigate this security risk.

Affected Version(s)

Jenkins OWASP Dependency-Check Plugin <= 5.1.1

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.