Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
References
Link Resource
https://jenkins.io/security/advisory/2018-02-05/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-02-09T23:00:00

Updated: 2018-02-09T22:57:01

Reserved: 2018-02-05T00:00:00


Link: CVE-2018-1000056

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-02-09T23:29:02.027

Modified: 2018-03-06T15:31:09.113


Link: CVE-2018-1000056

JSON object: View

cve-icon Redhat Information

No data.