First published: Wed Jul 12 2023(Updated: )
Jenkins External Monitor Job Type Plugin 206.v9a_94ff0b_4a_10 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins External Monitor Job Type | <=206.v9a_94ff0b_4a_10 | |
maven/org.jenkins-ci.plugins:external-monitor-job | <207.v98a | 207.v98a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37942 is classified as a high severity vulnerability due to its potential for XML external entity (XXE) attacks.
To fix CVE-2023-37942, update the Jenkins External Monitor Job Type Plugin to version 207.v98a or later.
Versions 206.v9a_94ff0b_4a_10 and earlier of the Jenkins External Monitor Job Type Plugin are affected by CVE-2023-37942.
Yes, CVE-2023-37942 poses information disclosure risks due to the potential exploitation of XML external entity processing.
Yes, CVE-2023-37942 can be exploited remotely if an attacker can control the XML input.