XML External Entity Reference vulnerability in Jenkins Pipeline: Phoenix AutoTest Plugin
High severity
GitHub Reviewed
Published
Mar 30, 2022
to the GitHub Advisory Database
•
Updated Feb 2, 2023
Description
Published by the National Vulnerability Database
Mar 29, 2022
Published to the GitHub Advisory Database
Mar 30, 2022
Reviewed
Nov 30, 2022
Last updated
Feb 2, 2023
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control the input files for the
readXml
orwriteXml
build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.References