CVE-2021-21672: XXE vulnerability in Jenkins Selenium HTML report Plugin
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.87421%
CWE
Published
7/2/2021
Updated
10/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:seleniumhtmlreport | maven | <= 1.0 | 1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XML parsing in TestResult.java
. The commit diff shows the patch added XXE protection features to the SAXParserFactory
configuration in the parseFor()
method. This method was vulnerable because it previously didn't restrict external entity resolution, allowing XXE attacks. Other files modified in the commit relate to dependency management and UI templates, but don't directly contribute to the XXE vulnerability.