XML External Entity injection in WebSphere Deployer - CVE-2020-2108

 

XML External Entity injection in WebSphere Deployer - CVE-2020-2108

Published: January 30, 2020


Vulnerability identifier: #VU24767
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-2108
CWE-ID: CWE-611
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Jenkins
Affected software:
WebSphere Deployer

Detailed vulnerability description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input. A remote user with Job/Configure permissions can pass a specially crafted war file containing a "WEB-INF/ibm-web-ext.xml" which is parsed by the plugin and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.


How to mitigate CVE-2020-2108

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources