First published: Tue Jun 11 2019(Updated: )
An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin 2.7 and earlier allowed attackers able to control a the content of the input file for the "XML" macro to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/atomic-openshift | <0:3.11.129-1.git.0.bd4f2d5.el7 | 0:3.11.129-1.git.0.bd4f2d5.el7 |
redhat/jenkins | <2-plugins-0:3.11.1560870549-1.el7 | 2-plugins-0:3.11.1560870549-1.el7 |
redhat/jenkins | <2-plugins-0:4.1.1561471763-1.el7 | 2-plugins-0:4.1.1561471763-1.el7 |
redhat/jenkins-plugin-token-macro | <2.8 | 2.8 |
Jenkins Token Macro Jenkins | <=2.7 | |
maven/org.jenkins-ci.plugins:token-macro | <=2.7 | 2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.