Jenkins Checkstyle Plugin 3.49 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-01-22/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:21:59
Updated: 2022-10-03T16:21:59
Reserved: 2022-10-03T00:00:00
Link: CVE-2018-1000009
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-01-23T14:29:00.360
Modified: 2018-02-07T12:20:38.053
Link: CVE-2018-1000009
JSON object: View
Redhat Information
No data.
CWE