First published: Thu Dec 03 2020(Updated: )
Jenkins CVS Plugin 2.16 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cvs | <=2.16 | |
maven/org.jenkins-ci.plugins:cvs | <=2.16 | 2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2324 has a medium severity rating due to the potential for unauthorized access via XML external entity (XXE) attacks.
To fix CVE-2020-2324, you should upgrade to Jenkins CVS Plugin version 2.17 or later.
CVE-2020-2324 can enable XML external entity (XXE) attacks which can compromise the server's security.
CVE-2020-2324 affects Jenkins CVS Plugin versions 2.16 and earlier.
CVE-2020-2324 can be exploited by attackers who have control over an agent process.