First published: Wed Nov 04 2020(Updated: )
A flaw was found in the mercurial plugin in Jenkins. The XML changelog parser is not configured to prevent an XML external entity (XXE) attack allowing an attacker the ability to control an agent process to have Jenkins parse a crafted changelog file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. The highest threat from this vulnerability is to data confidentiality.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:3.11.1612862361-1.el7 | 2-plugins-0:3.11.1612862361-1.el7 |
redhat/jenkins | <2-plugins-0:4.4.1611203637-1.el7 | 2-plugins-0:4.4.1611203637-1.el7 |
redhat/jenkins | <2-plugins-0:4.5.1610108899-1.el7 | 2-plugins-0:4.5.1610108899-1.el7 |
redhat/jenkins | <2-plugins-0:4.6.1609853716-1.el8 | 2-plugins-0:4.6.1609853716-1.el8 |
Jenkins Mercurial | <=2.11 | |
maven/org.jenkins-ci.plugins:mercurial | <2.8.1 | 2.8.1 |
maven/org.jenkins-ci.plugins:mercurial | =2.9 | 2.9.1 |
maven/org.jenkins-ci.plugins:mercurial | =2.10 | 2.10.1 |
maven/org.jenkins-ci.plugins:mercurial | =2.11 | 2.12 |
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)