Vulnerability Description
Jenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Pom2Config | <= 1.2 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2021/11/12/1Mailing ListThird Party Advisory
- https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2415Vendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-21-1314/Third Party AdvisoryVDB Entry
- http://www.openwall.com/lists/oss-security/2021/11/12/1Mailing ListThird Party Advisory
- https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2415Vendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-21-1314/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2021-43576?
CVE-2021-43576 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Jenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins...
How severe is CVE-2021-43576?
CVE-2021-43576 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-43576?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Pom2Config.