First published: Wed Nov 04 2020(Updated: )
A flaw was found in the subversion Jenkins plugin. The XML parser is not properly configured to prevent XML external entity (XXE) attacks allowing an attacker the ability to control an agent process and have Jenkins parse a crafted changelog file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. The highest threat from this vulnerability is to data confidentiality.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:3.11.1612862361-1.el7 | 2-plugins-0:3.11.1612862361-1.el7 |
redhat/jenkins | <2-plugins-0:4.4.1611203637-1.el7 | 2-plugins-0:4.4.1611203637-1.el7 |
redhat/jenkins | <2-plugins-0:4.5.1610108899-1.el7 | 2-plugins-0:4.5.1610108899-1.el7 |
redhat/jenkins | <2-plugins-0:4.6.1609853716-1.el8 | 2-plugins-0:4.6.1609853716-1.el8 |
Jenkins Subversion | <=2.13.1 | |
maven/org.jenkins-ci.plugins:subversion | <2.13.2 | 2.13.2 |
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-2304 is a vulnerability in the Jenkins Subversion Plugin that allows an attacker to control an agent process and extract secrets.
CVE-2020-2304 has a severity score of 6.5, which is considered high.
CVE-2020-2304 affects Jenkins Subversion Plugin versions 2.13.1 and earlier.
To fix CVE-2020-2304, you should update Jenkins Subversion Plugin to version 2.13.2.
You can find more information about CVE-2020-2304 in the Jenkins security advisory and the Red Hat Security Advisory.