CVE-2023-49656: Jenkins MATLAB Plugin XML External Entity vulnerability
7.1
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:matlab | maven | < 2.11.1 | 2.11.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in two core components: 1) HTTP endpoints handling form validation without security controls, and 2) XML parsing without XXE protections. Jenkins plugin patterns indicate form validation is typically handled by doCheck methods in DescriptorImpl classes. The advisory explicitly mentions missing permission checks and CSRF protections in these endpoints. For XXE, the XML parsing function that checks MATLAB installations would be the logical location for insecure DocumentBuilderFactory usage, as this is the primary XML processing described in the vulnerability description. Both locations are directly mentioned in the advisory as root causes for different aspects of the vulnerability (CWE-611 for XXE, and CSRF/missing auth checks for the endpoints).