Vulnerabilites related to Qualys,Inc. - Web App Scanning Connector Jenkins Plugin
cve-2023-6149
Vulnerability from cvelistv5
Published
2024-01-09 08:21
Modified
2024-08-02 08:21
Summary
Qualys Jenkins Plugin for WAS prior to version and including 2.0.11 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T08:21:17.517Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.qualys.com/security-advisories/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Web App Scanning Connector Jenkins Plugin",
               vendor: "Qualys,Inc. ",
               versions: [
                  {
                     changes: [
                        {
                           at: "2.0.12",
                           status: "unaffected",
                        },
                     ],
                     lessThanOrEqual: "2.0.3",
                     status: "affected",
                     version: "2.0.11",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               type: "reporter",
               user: "00000000-0000-4000-9000-000000000000",
               value: "Yaroslav Afenkin, CloudBees, Inc. ",
            },
         ],
         datePublic: "2024-01-09T08:19:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n<span style=\"background-color: rgb(255, 255, 255);\">Qualys Jenkins Plugin for WAS prior to version and including 2.0.11 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. T</span><span style=\"background-color: rgb(255, 255, 255);\">his allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data</span>",
                  },
               ],
               value: "\nQualys Jenkins Plugin for WAS prior to version and including 2.0.11 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-611",
                     description: "CWE-611 Improper Restriction of XML External Entity Reference",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-09T08:21:12.804Z",
            orgId: "8a309ac4-d8c7-4735-9c1d-ca39c5dfbcda",
            shortName: "Qualys",
         },
         references: [
            {
               url: "https://www.qualys.com/security-advisories/",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n<span style=\"background-color: rgb(255, 255, 255);\">Customers should upgrade to a minimum version of 2.0.12</span><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;</span>\n\n<br>",
                  },
               ],
               value: "\nCustomers should upgrade to a minimum version of 2.0.12 \n\n\n",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Possible XXE vulnerability in Jenkins Plugin for Qualys Web Application Security ",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8a309ac4-d8c7-4735-9c1d-ca39c5dfbcda",
      assignerShortName: "Qualys",
      cveId: "CVE-2023-6149",
      datePublished: "2024-01-09T08:21:12.804Z",
      dateReserved: "2023-11-15T10:10:27.944Z",
      dateUpdated: "2024-08-02T08:21:17.517Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}