CVE-2020-2120: XXE vulnerability in FitNesse Plugin
7.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.33833%
CWE
Published
5/24/2022
Updated
12/13/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:fitnesse | maven | < 1.31 | 1.31 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XML parser configuration in TransformerFactory instances. The patch explicitly adds 'setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true)' to both locations:
- In ConvertReport.java's XML transformation path used for report conversion
- In FitnessePlugin.java's template initialization These functions were vulnerable because they created XML processors without disabling external entity resolution, a critical security setting for XXE prevention. The high confidence comes from the direct correlation between the vulnerability description (missing secure processing) and the specific functions modified in the security patch.