Loading HuntDB...

GHSA-38w8-h222-wrpp

GitHub Security Advisory

Improper Restriction of XML External Entity Reference in Jenkins Chef Sinatra

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation.

As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Affected Packages

Maven org.jenkins-ci.plugins:sinatra-chef-builder
Affected versions: 0 (last affected: 1.20)

Related CVEs

Key Information

GHSA ID
GHSA-38w8-h222-wrpp
Published
February 16, 2022 12:01 AM
Last Modified
December 1, 2022 10:12 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:sinatra-chef-builder
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.