First published: Tue Nov 15 2022(Updated: )
JAPEX Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control XML input files for the 'Record Japex test report' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins | <=1.7 | |
maven/org.jvnet.hudson.plugins:japex | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45400 is rated as a high severity vulnerability due to its potential for XML external entity (XXE) attacks.
To fix CVE-2022-45400, upgrade the Jenkins JAPEX Plugin to version 1.8 or later.
CVE-2022-45400 makes it possible for attackers to exploit XML external entity (XXE) vulnerabilities.
Versions of the Jenkins JAPEX Plugin up to and including 1.7 are affected by CVE-2022-45400.
There are no known workarounds for CVE-2022-45400; the only solution is to update to a secure version.