// For flags

CVE-2023-6147

Possible XXE vulnerability in Jenkins Plugin for Qualys Policy Compliance

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data

Se identificó que Qualys Jenkins Plugin para Policy Compliance anterior a la versión 1.0.5 incluida estaba afectado por un fallo de seguridad, al que le faltaba una verificación de permiso al realizar una verificación de conectividad con Qualys Cloud Services. Esto permitió a cualquier usuario con acceso de inicio de sesión configurar o editar jobs para utilizar el complemento y configurar un endpoint potencial a través del cual era posible controlar la respuesta para cierta solicitud que podría inyectarse con payloads XXE que conduzcan a XXE mientras se procesan los datos de respuesta.

*Credits: Yaroslav Afenkin, CloudBees, Inc.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-11-15 CVE Reserved
  • 2024-01-09 CVE Published
  • 2024-01-13 EPSS Updated
  • 2024-11-14 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Qualys
Search vendor "Qualys"
Policy Compliance
Search vendor "Qualys" for product "Policy Compliance"
<= 1.0.5
Search vendor "Qualys" for product "Policy Compliance" and version " <= 1.0.5"
jenkins
Affected