CVE-2020-2108: XXE vulnerability in Jenkins WebSphere Deployer Plugin
7.6
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.18812%
CWE
Published
5/24/2022
Updated
1/28/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:websphere-deployer | maven | <= 1.6.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XML parsing of ibm-web-ext.xml
during WAR file processing. While the exact function name isn't provided in advisories, the plugin's purpose (WebSphere deployment) and CWE-611 context imply a missing secure configuration in the XML parser initialization. Java's default XML parsers (e.g., DocumentBuilderFactory
) are vulnerable unless explicitly hardened. The high confidence comes from the explicit advisory statement about missing XXE protections in the parser configuration.