Miggo Logo

CVE-2023-24430: XML external entity reference vulnerability on agents in Jenkins Semantic Versioning Plugin

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.27359%
Published
1/26/2023
Updated
10/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:semantic-versioning-pluginmaven< 1.151.15

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure XML parsing in the PomParser class. The commit diff shows the fix added security attributes (XMLConstants.ACCESS_EXTERNAL_DTD/SCHEMA) to the DocumentBuilderFactory, which were absent in vulnerable versions. The invoke() method directly handles XML parsing, making it the entry point for XXE exploitation. The CVE description explicitly ties the issue to improper XML parser configuration, aligning with this code change.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins S*m*nti* V*rsionin* Plu*in *.** *n* **rli*r *o*s not *on*i*ur* its XML p*rs*r to pr*v*nt XML *xt*rn*l *ntity (XX*) *tt**ks.

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* XML p*rsin* in t** PomP*rs*r *l*ss. T** *ommit *i** s*ows t** *ix ***** s**urity *ttri*ut*s (XML*onst*nts.****SS_*XT*RN*L_*T*/S***M*) to t** *o*um*nt*uil**r***tory, w*i** w*r* **s*nt in vuln*r**l* v*rsions. T** i