Miggo Logo

CVE-2021-43576: XXE vulnerability in Jenkins pom2config Plugin

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.7566%
Published
5/24/2022
Updated
10/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:pom2configmaven<= 1.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper XML parser configuration in the pom2config plugin. The ZDI-21-1314 advisory explicitly identifies the Pom2Config class as the location of the flaw. In Java-based XML processing, XXE vulnerabilities typically occur when DocumentBuilderFactory/SAXParserFactory instances are created without setting security features like FEATURE_SECURE_PROCESSING or disabling DTDs. The absence of these protections in the XML parsing function within Pom2Config would directly enable XXE attacks. While the exact method name isn't specified in advisories, 'parsePom' is a logical candidate given the plugin's purpose of converting Maven POM files to Jenkins configs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins pom**on*i* Plu*in *.* *n* **rli*r *o*s not *on*i*ur* its XML p*rs*r to pr*v*nt XML *xt*rn*l *ntity (XX*) *tt**ks. T*is *llows *tt**k*rs wit* Ov*r*ll/R*** *n* It*m/R*** p*rmissions to **v* J*nkins p*rs* * *r**t** XML *il* t**t us*s *xt*rn*l *

Reasoning

T** vuln*r**ility st*ms *rom improp*r XML p*rs*r *on*i*ur*tion in t** pom**on*i* plu*in. T** Z*I-**-**** **visory *xpli*itly i**nti*i*s t** Pom**on*i* *l*ss *s t** lo**tion o* t** *l*w. In J*v*-**s** XML pro**ssin*, XX* vuln*r**iliti*s typi**lly o**u