CVE-2021-43576: XXE vulnerability in Jenkins pom2config Plugin
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.7566%
CWE
Published
5/24/2022
Updated
10/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:pom2config | maven | <= 1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper XML parser configuration in the pom2config plugin. The ZDI-21-1314 advisory explicitly identifies the Pom2Config class as the location of the flaw. In Java-based XML processing, XXE vulnerabilities typically occur when DocumentBuilderFactory/SAXParserFactory instances are created without setting security features like FEATURE_SECURE_PROCESSING or disabling DTDs. The absence of these protections in the XML parsing function within Pom2Config would directly enable XXE attacks. While the exact method name isn't specified in advisories, 'parsePom' is a logical candidate given the plugin's purpose of converting Maven POM files to Jenkins configs.