6.5
CVSSv3

CVE-2021-43576

Published: 12/11/2021 Updated: 22/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Jenkins pom2config Plugin 1.2 and previous versions does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins pom2config

Mailing Lists

Jenkins is an open source automation server which enables developers around the world to reliably build, test, and deploy their software The following releases contain fixes for security vulnerabilities: * Active Choices Plugin 257 * Scriptler Plugin 34 Additionally, we announce unresolved security issues in the following plugins: * OWASP D ...