CVE-2023-24443:
XML Entity Expansion in Jenkins TestComplete support Plugin
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.27359%
CWE
Published
1/26/2023
Updated
1/5/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:TestComplete | maven | <= 2.8.1 | 2.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XML parsing in the TestComplete plugin. The commit diff shows the fix added security configurations (disabling external entities, DTDs, and enabling secure processing) via a new secureDocumentBuilderFactory
method. The vulnerable version lacked these protections in getRootDocumentNodeFromArchive
, which handles XML parsing from user-supplied ZIP archives. This matches the CWE-611/776 description of improper XML parser configuration.