Description
An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin 2.7 and earlier allowed attackers able to control a the content of the input file for the "XML" macro to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3903 | An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin 2.7 and earlier allowed attackers able to control a the content of the input file for the "XML" macro to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks. |
Github GHSA |
GHSA-g6h2-4x64-c59x | Improper Restriction of XML External Entity Reference Jenkins Token Macro Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T22:17:20.365Z
Reserved: 2019-03-29T00:00:00.000Z
Link: CVE-2019-10337
No data.
Status : Modified
Published: 2019-06-11T14:29:01.057
Modified: 2024-11-21T04:18:55.137
Link: CVE-2019-10337
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA