CVE-2018-1000011: XML External Entity Reference in Jenkins FindBugs Plugin
8.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.21424%
CWE
Published
5/14/2022
Updated
2/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jvnet.hudson.plugins.findbugs:library | maven | <= 4.7.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XML parsing in the FindBugs report processing. The advisory specifically mentions disabling external entity resolution as the fix. In Java XML processing, this typically involves DocumentBuilderFactory configuration. The FindBugsParser class would contain the XML parsing logic for processing analysis reports, and its parse method would be responsible for XML handling. While exact code isn't available, the pattern matches standard XXE vulnerabilities where XML parsers aren't properly secured with features like FEATURE_SECURE_PROCESSING or explicit disabling of DTDs.