Jenkins Warnings Plugin 4.64 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
References
Link Resource
https://jenkins.io/security/advisory/2018-01-22/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:21:59

Updated: 2022-10-03T16:21:59

Reserved: 2022-10-03T00:00:00


Link: CVE-2018-1000012

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-01-23T14:29:00.563

Modified: 2018-02-07T12:21:37.853


Link: CVE-2018-1000012

JSON object: View

cve-icon Redhat Information

No data.

CWE