First published: Wed Sep 21 2022(Updated: )
Jenkins Compuware Common Configuration Plugin 1.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Compuware Common Configuration | <=1.0.14 | |
Jenkins Compuware Common Configuration | <1.0.15 | |
maven/com.compuware.jenkins:compuware-common-configuration | <=1.0.14 | 1.0.15 |
<1.0.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41226 has a medium severity level due to the potential for XML external entity (XXE) attacks.
To fix CVE-2022-41226, upgrade the Jenkins Compuware Common Configuration Plugin to version 1.0.15 or later.
CVE-2022-41226 can lead to sensitive information disclosure and other attacks through malicious XML input.
Versions 1.0.14 and earlier of the Jenkins Compuware Common Configuration Plugin are affected by CVE-2022-41226.
Yes, CVE-2022-41226 specifically affects the Jenkins Compuware Common Configuration Plugin.