First published: Thu Mar 23 2023(Updated: )
Jenkins Performance Publisher Plugin 8.09 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Performance | <=8.09 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-28682 is categorized as medium due to potential XML external entity (XXE) attack risks.
To fix CVE-2023-28682, upgrade the Jenkins Performance Publisher Plugin to version 8.10 or later.
CVE-2023-28682 is vulnerable to XML external entity (XXE) attacks.
Versions 8.09 and earlier of the Jenkins Performance Publisher Plugin are affected by CVE-2023-28682.
If upgrading is not possible, consider implementing a workaround by configuring the XML parser to disable external entity processing.