Vulnerability Details CVE-2018-1000056
Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 37.2%
CVSS Severity
CVSS v3 Score 8.3
CVSS v2 Score 6.5
Products affected by CVE-2018-1000056
-
cpe:2.3:a:jenkins:junit:1.0
-
cpe:2.3:a:jenkins:junit:1.1
-
cpe:2.3:a:jenkins:junit:1.10
-
cpe:2.3:a:jenkins:junit:1.11
-
cpe:2.3:a:jenkins:junit:1.12
-
cpe:2.3:a:jenkins:junit:1.13
-
cpe:2.3:a:jenkins:junit:1.14
-
cpe:2.3:a:jenkins:junit:1.15
-
cpe:2.3:a:jenkins:junit:1.16
-
cpe:2.3:a:jenkins:junit:1.17
-
cpe:2.3:a:jenkins:junit:1.18
-
cpe:2.3:a:jenkins:junit:1.19
-
cpe:2.3:a:jenkins:junit:1.2
-
cpe:2.3:a:jenkins:junit:1.20
-
cpe:2.3:a:jenkins:junit:1.21
-
cpe:2.3:a:jenkins:junit:1.22
-
cpe:2.3:a:jenkins:junit:1.22.1
-
cpe:2.3:a:jenkins:junit:1.22.2
-
cpe:2.3:a:jenkins:junit:1.23
-
cpe:2.3:a:jenkins:junit:1.3
-
cpe:2.3:a:jenkins:junit:1.4
-
cpe:2.3:a:jenkins:junit:1.5
-
cpe:2.3:a:jenkins:junit:1.6
-
cpe:2.3:a:jenkins:junit:1.7
-
cpe:2.3:a:jenkins:junit:1.8
-
cpe:2.3:a:jenkins:junit:1.9