First published: Tue Mar 29 2022(Updated: )
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Pipeline\ | <=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28155 is categorized as a high severity vulnerability due to its ability to allow XML External Entity (XXE) attacks.
To fix CVE-2022-28155, upgrade the Jenkins Pipeline: Phoenix AutoTest Plugin to version 1.4 or later.
CVE-2022-28155 can be exploited to conduct XML External Entity (XXE) attacks, potentially leading to information disclosure and server-side request forgery.
CVE-2022-28155 affects versions of the Phoenix AutoTest Plugin up to and including 1.3.
CVE-2022-28155 involves improper configuration of the XML parser that fails to protect against XXE attacks.