Miggo Logo

CVE-2018-1000011: XML External Entity Reference in Jenkins FindBugs Plugin

8.8

CVSS Score
3.0

Basic Information

EPSS Score
0.21424%
Published
5/14/2022
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jvnet.hudson.plugins.findbugs:librarymaven<= 4.7.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure XML parsing in the FindBugs report processing. The advisory specifically mentions disabling external entity resolution as the fix. In Java XML processing, this typically involves DocumentBuilderFactory configuration. The FindBugsParser class would contain the XML parsing logic for processing analysis reports, and its parse method would be responsible for XML handling. While exact code isn't available, the pattern matches standard XXE vulnerabilities where XML parsers aren't properly secured with features like FEATURE_SECURE_PROCESSING or explicit disabling of DTDs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins *in**u*s Plu*in *.** *n* **rli*r pro**ss*s XML *xt*rn*l *ntiti*s in *il*s it p*rs*s *s p*rt o* t** *uil* pro**ss, *llowin* *tt**k*rs wit* us*r p*rmissions in J*nkins to *xtr**t s**r*ts *rom t** J*nkins m*st*r, p*r*orm s*rv*r-si** r*qu*st *or*

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* XML p*rsin* in t** *in**u*s r*port pro**ssin*. T** **visory sp**i*i**lly m*ntions *is**lin* *xt*rn*l *ntity r*solution *s t** *ix. In J*v* XML pro**ssin*, t*is typi**lly involv*s *o*um*nt*uil**r***tory *on*i*ur*t