Description
Jenkins CCM Plugin 3.1 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
Remediation
References
https://jenkins.io/security/advisory/2018-02-05/
Related Vulnerabilities
CVE-2013-2165 Vulnerability in maven package org.richfaces:richfaces
CVE-2022-22965 Vulnerability in maven package org.springframework.boot:spring-boot-starter-web
CVE-2010-4207 Vulnerability in npm package yui
CVE-2023-37943 Vulnerability in maven package org.jenkins-ci.plugins:active-directory
CVE-2021-27850 Vulnerability in maven package org.apache.tapestry:tapestry-core