Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-02-05/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-02-09T23:00:00
Updated: 2018-02-09T22:57:01
Reserved: 2018-02-05T00:00:00
Link: CVE-2018-1000056
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-02-09T23:29:02.027
Modified: 2018-03-06T15:31:09.113
Link: CVE-2018-1000056
JSON object: View
Redhat Information
No data.