Jenkins Security Advisory 2021-06-18

This advisory announces vulnerabilities in the following Jenkins deliverables:

Descriptions

XXE vulnerability in Generic Webhook Trigger Plugin

SECURITY-2330 / CVE-2021-21669
Severity (CVSS): High
Affected plugin: generic-webhook-trigger
Description:

Generic Webhook Trigger Plugin 1.72 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers with the ability to call webhooks configured to extract parameters using XPath to have Jenkins parse a crafted XML request body that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Generic Webhook Trigger Plugin 1.74 disables external entity resolution for its XML parser.

Severity

Affected Versions

  • Generic Webhook Trigger Plugin up to and including 1.72

Fix

  • Generic Webhook Trigger Plugin should be updated to version 1.74

These versions include fixes to the vulnerabilities described above. All prior versions are considered to be affected by these vulnerabilities unless otherwise indicated.

Credit

The Jenkins project would like to thank the reporters for discovering and reporting these vulnerabilities:

  • Kevin Guerroudj, Justin Philip, Marc Heyries for SECURITY-2330