Description
Jenkins Checkstyle Plugin 3.49 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
Remediation
References
https://jenkins.io/security/advisory/2018-01-22/
Related Vulnerabilities
CVE-2015-0250 Vulnerability in maven package org.eclipse.birt.runtime:org.apache.batik.dom
CVE-2020-6541 Vulnerability in maven package org.webjars.npm:electron
CVE-2020-2199 Vulnerability in maven package org.jenkins-ci.plugins:subversion
CVE-2023-28676 Vulnerability in maven package org.jenkins-ci.plugins:convert-to-pipeline
CVE-2011-2712 Vulnerability in maven package org.apache.wicket:wicket