QID 375686

Date Published: 2021-07-06

QID 375686: Jenkins Generic Webhook Trigger Plugin Vulnerability (Jenkins Security Advisory 2021-06-18)

Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.

Jenkins Generic Webhook Trigger Plugin 1.72 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

Affected Versions:
Generic Webhook Trigger Plugin up to and including 1.72

QID Detection Logic:(Authenticated)
This QID checks for vulnerable versions of jenkins plugin installed on the target.

The vulnerability allows an attacker the ability to call webhooks configured to extract parameters using XPath to have Jenkins parse a crafted XML request body that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customer are advised to update Generic Webhook Trigger Plugin to version 1.74.
    For more information visit Jenkins Security Advisory 2021-06-18
    Vendor References

    CVEs related to QID 375686

    Software Advisories
    Advisory ID Software Component Link
    Jenkins Security Advisory 2021-06-18 URL Logo www.jenkins.io/security/advisory/2021-06-18/