Miggo Logo

CVE-2021-21659: XXE vulnerability in Jenkins URLTrigger Plugin

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.78457%
Published
5/24/2022
Updated
10/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:urltriggermaven<= 0.480.49

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure XML parser configuration in the URLTrigger Plugin. The advisory explicitly states the parser wasn't configured to prevent XXE, and the fix involved disabling external entity resolution. The most likely vulnerable functions are those handling XML content parsing from URLs. The 'checkURL' method would initiate content retrieval/processing, while 'XMLContentType#parseContent' would directly handle XML parsing. Both would require secure parser configuration (disabling DTDs/external entities) to mitigate XXE, which was missing in vulnerable versions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins URLTri***r Plu*in *.** *n* **rli*r *o*s not *on*i*ur* its XML p*rs*r to pr*v*nt XML *xt*rn*l *ntity (XX*) *tt**ks. T*is *llows *tt**k*rs wit* Jo*/*on*i*ur* p*rmission or ot**rwis* **l* to *ontrol t** *ont*nts o* *n URL to *n XML *o*um*nt **i

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* XML p*rs*r *on*i*ur*tion in t** URLTri***r Plu*in. T** **visory *xpli*itly st*t*s t** p*rs*r w*sn't *on*i*ur** to pr*v*nt XX*, *n* t** *ix involv** *is**lin* *xt*rn*l *ntity r*solution. T** most lik*ly vuln*r**l*