First published: Fri Feb 09 2018(Updated: )
Jenkins CCM Plugin 3.1 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Ccm | <=3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000054 has a medium severity rating due to its potential impact on data security.
To fix CVE-2018-1000054, update the Jenkins CCM Plugin to version 3.2 or later.
CVE-2018-1000054 allows attackers to extract secrets, perform server-side request forgery, or cause denial-of-service attacks.
Any Jenkins user with permissions who has access to the vulnerable CCM Plugin versions 3.1 and earlier is affected by CVE-2018-1000054.
Jenkins CCM Plugin versions up to and including 3.1 are impacted by CVE-2018-1000054.