First published: Tue Nov 15 2022(Updated: )
Jenkins Violations Plugin 0.7.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Violations | <=0.7.11 | |
maven/org.jenkins-ci.plugins:violations | <=0.7.11 | |
<=0.7.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45386 has been classified as a medium severity vulnerability due to its potential to facilitate XML external entity (XXE) attacks.
To fix CVE-2022-45386, upgrade the Jenkins Violations Plugin to version 0.7.12 or later where the XML parser is correctly configured.
CVE-2022-45386 specifically affects Jenkins Violations Plugin versions 0.7.11 and earlier.
CVE-2022-45386 allows attackers to potentially control XML input files, which can lead to unauthorized data access or attacks on the server.
Yes, CVE-2022-45386 exposes systems to XML external entity (XXE) attacks due to improper XML parser configuration.