First published: Wed Apr 21 2021(Updated: )
A flaw was found in the config-file-provider Jenkins plugin. The plugin XML parser wasn't configure to prevent XML external entity (XXE) attacks. An attacker with the ability to define Maven configuration files can use this vulnerability to prepare a crafted configuration file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:3.11.1624366838-1.el7 | 2-plugins-0:3.11.1624366838-1.el7 |
redhat/jenkins | <2-plugins-0:4.5.1623326336-1.el7 | 2-plugins-0:4.5.1623326336-1.el7 |
redhat/jenkins | <2-plugins-0:4.6.1623162648-1.el8 | 2-plugins-0:4.6.1623162648-1.el8 |
redhat/cri-o | <0:1.20.2-12.rhaos4.7.git9f7be76.el8 | 0:1.20.2-12.rhaos4.7.git9f7be76.el8 |
redhat/cri-tools | <0:1.20.0-3.el7 | 0:1.20.0-3.el7 |
redhat/jenkins | <2-plugins-0:4.7.1621361158-1.el8 | 2-plugins-0:4.7.1621361158-1.el8 |
redhat/redhat-release-coreos | <0:47.83-2.el8 | 0:47.83-2.el8 |
Jenkins Config File Provider | <=3.7.0 | |
maven/org.jenkins-ci.plugins:config-file-provider | <=3.7.0 | 3.7.1 |
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-21642 is a vulnerability in the Jenkins Config File Provider Plugin that allows for XML external entity (XXE) attacks.
CVE-2021-21642 has a severity rating of 8.1 (high).
Jenkins Config File Provider Plugin versions 3.7.0 and earlier are affected by CVE-2021-21642.
To fix CVE-2021-21642, upgrade to version 3.7.1 of the Jenkins Config File Provider Plugin.
More information about CVE-2021-21642 can be found on the Jenkins.io and Red Hat websites.