Vulnerabilites related to Jenkins project - Jenkins REPO Plugin
cve-2022-43415
Vulnerability from cvelistv5
Published
2022-10-19 00:00
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Jenkins REPO Plugin 1.15.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Jenkins project | Jenkins REPO Plugin |
Version: unspecified < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T13:32:58.758Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2337", }, { name: "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/10/19/3", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Jenkins REPO Plugin", vendor: "Jenkins project", versions: [ { lessThanOrEqual: "1.15.0", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Jenkins REPO Plugin 1.15.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.", }, ], providerMetadata: { dateUpdated: "2023-10-24T14:25:43.532Z", orgId: "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", shortName: "jenkins", }, references: [ { url: "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2337", }, { name: "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2022/10/19/3", }, ], }, }, cveMetadata: { assignerOrgId: "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", assignerShortName: "jenkins", cveId: "CVE-2022-43415", datePublished: "2022-10-19T00:00:00", dateReserved: "2022-10-18T00:00:00", dateUpdated: "2024-08-03T13:32:58.758Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-30949
Vulnerability from cvelistv5
Published
2022-05-17 14:06
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
References
▼ | URL | Tags |
---|---|---|
https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2022/05/17/8 | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Jenkins project | Jenkins REPO Plugin |
Version: unspecified < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T07:03:39.748Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478", }, { name: "[oss-security] 20220517 Multiple vulnerabilities in Jenkins plugins", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/05/17/8", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Jenkins REPO Plugin", vendor: "Jenkins project", versions: [ { lessThanOrEqual: "1.14.0", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.", }, ], providerMetadata: { dateUpdated: "2023-10-24T14:21:43.835Z", orgId: "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", shortName: "jenkins", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478", }, { name: "[oss-security] 20220517 Multiple vulnerabilities in Jenkins plugins", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2022/05/17/8", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "jenkinsci-cert@googlegroups.com", ID: "CVE-2022-30949", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Jenkins REPO Plugin", version: { version_data: [ { version_affected: "<=", version_value: "1.14.0", }, ], }, }, ], }, vendor_name: "Jenkins project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-435: Improper Interaction Between Multiple Correctly-Behaving Entities", }, ], }, ], }, references: { reference_data: [ { name: "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478", refsource: "CONFIRM", url: "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478", }, { name: "[oss-security] 20220517 Multiple vulnerabilities in Jenkins plugins", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/05/17/8", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", assignerShortName: "jenkins", cveId: "CVE-2022-30949", datePublished: "2022-05-17T14:06:09", dateReserved: "2022-05-16T00:00:00", dateUpdated: "2024-08-03T07:03:39.748Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }