Impact: Moderate Public Date: 2015-02-27 CWE: CWE-611 Bugzilla: 1205632: CVE-2015-1811 jenkins: External entity processing in XML can reveal sensitive local files (SECURITY-167) It was found that Jenkins' XML handling allowed XML External Entity (XXE) expansion. A remote attacker with the ability to pass XML data to Jenkins could use this flaw to read arbitrary XML files on the Jenkins server.
Find out more about CVE-2015-1811 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 3.5 |
---|---|
Base Metrics | AV:N/AC:M/Au:S/C:P/I:N/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
RHOSE Client 2.0 (jenkins) | RHSA-2015:1844 | 2015-09-30 |