First published: Tue Nov 15 2022(Updated: )
Jenkins JAPEX Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Japex | <=1.7 | |
<=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45400 is rated as a high severity vulnerability due to its potential for XML external entity (XXE) attacks.
To fix CVE-2022-45400, upgrade the Jenkins JAPEX Plugin to version 1.8 or later.
CVE-2022-45400 makes it possible for attackers to exploit XML external entity (XXE) vulnerabilities.
Versions of the Jenkins JAPEX Plugin up to and including 1.7 are affected by CVE-2022-45400.
There are no known workarounds for CVE-2022-45400; the only solution is to update to a secure version.