CVE-2023-6147:
Qualys Jenkins Plugin for Policy Compliance XML External Entity vulnerability
5.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.39029%
CWE
Published
1/9/2024
Updated
1/24/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.qualys.plugins:qualys-pc | maven | <= 1.0.5 | 1.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XML processing during Qualys Cloud Services connectivity checks. The advisory explicitly states the plugin
didn't restrict XXE, which typically manifests in XML parser configuration
. The connectivity check endpoint would involve parsing XML responses - a prime candidate for XXE if parser security features aren't enabled. While exact function
names aren't provided, Java XML parsing patterns (DocumentBuilderFactory/SAXParser
without setFeature("http://apache.org/xml/features/disallow-doctype-decl", true)
) strongly indicate this implementation flaw. The missing permission check allows attackers to trigger this vulnerable code
path.