Description
Jenkins DRY Plugin 2.49 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
Remediation
References
https://jenkins.io/security/advisory/2018-01-22/
Related Vulnerabilities
CVE-2014-3530 Vulnerability in maven package org.picketlink:picketlink-common
CVE-2018-6341 Vulnerability in maven package org.webjars:vue
CVE-2022-36909 Vulnerability in maven package org.jenkins-ci.plugins:openshift-deployer
CVE-2023-32977 Vulnerability in maven package org.jenkins-ci.plugins.workflow:workflow-job
CVE-2019-10286 Vulnerability in maven package com.openmake:deployhub