CVE-2023-6147

Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data
Configurations

Configuration 1 (hide)

cpe:2.3:a:qualys:policy_compliance:*:*:*:*:*:jenkins:*:*

History

24 Jan 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/01/24/6 -

12 Jan 2024, 19:40

Type Values Removed Values Added
CPE cpe:2.3:a:qualys:policy_compliance:*:*:*:*:*:jenkins:*:*
References () https://www.qualys.com/security-advisories/ - () https://www.qualys.com/security-advisories/ - Vendor Advisory
CWE CWE-611
First Time Qualys policy Compliance
Qualys
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

09 Jan 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-09 08:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-6147

Mitre link : CVE-2023-6147

CVE.ORG link : CVE-2023-6147


JSON object : View

Products Affected

qualys

  • policy_compliance
CWE
CWE-611

Improper Restriction of XML External Entity Reference