First published: Mon Mar 09 2020(Updated: )
Cobertura Plugin 1.15 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for the 'Publish Cobertura Coverage Report' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. Cobertura Plugin 1.16 disables external entity resolution for its XML parser.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cobertura | <=1.15 | |
maven/org.jenkins-ci.plugins:cobertura | <=1.15 | 1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2138 has a severity rating of medium due to the potential for XML external entity (XXE) attacks.
To fix CVE-2020-2138, upgrade the Cobertura Plugin to version 1.16 or later.
CVE-2020-2138 affects Jenkins Cobertura Plugin versions 1.15 and earlier.
CVE-2020-2138 is classified as an XML External Entity (XXE) vulnerability.
Any user who can control the input files for the 'Publish Cobertura Coverage Report' post-build step in Jenkins can exploit CVE-2020-2138.