XML External Entity Vulnerability in Jenkins REPO Plugin by Jenkins
CVE-2022-43415
7.5HIGH
Summary
The Jenkins REPO Plugin versions up to 1.15.0 are susceptible to XML external entity (XXE) attacks due to improper configuration of its XML parser. This vulnerability can allow an attacker to exploit the parser to access sensitive files on the server or execute unauthorized operations. Proper measures should be taken to update the plugin and mitigate potential risks associated with this vulnerability.
Affected Version(s)
Jenkins REPO Plugin <= 1.15.0
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved