Skip to main content

Notice: this Wiki will be going read only early in 2024 and edits will no longer be possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.

Jump to: navigation, search

Difference between revisions of "Hudson-ci/alerts/CVE-2015-8031"

Line 1: Line 1:
{{Hudson | pageTitle = Hudson Security Advisory CVE-2015-8031}}
+
{{Hudson | pageTitle = Hudson Security Advisory<br/> CVE-2015-8031}}
  
 
==CVE-2015-8031 - Hudson XML External Entity Injection==
 
==CVE-2015-8031 - Hudson XML External Entity Injection==
Line 25: Line 25:
 
Prior to version 3.3.2 Hudson exhibits a flaw in it's XML API processing that can allow access to potentially sensitive information on the filesystem of the Hudson master server.
 
Prior to version 3.3.2 Hudson exhibits a flaw in it's XML API processing that can allow access to potentially sensitive information on the filesystem of the Hudson master server.
  
===Remediation===
+
===Fix===
 
Hudson users should upgrade to Hudson 3.3.2 or above as soon as possible
 
Hudson users should upgrade to Hudson 3.3.2 or above as soon as possible
  
 
===Credits===
 
===Credits===
 
The Hudson Team would like to thank Luca Carettoni, Fabian Beterke and Tushar Dalvi from LinkedIn for their work in uncovering and reporting this vulnerability.
 
The Hudson Team would like to thank Luca Carettoni, Fabian Beterke and Tushar Dalvi from LinkedIn for their work in uncovering and reporting this vulnerability.

Revision as of 07:35, 3 November 2015

Hudson Continuous Integration Server
Website
Download
Community
Mailing ListForumsIRCmattermost
Issues
OpenHelp WantedBug Day
Contribute
Browse Source
Hudson-bust.png Hudson Security Advisory
CVE-2015-8031











CVE-2015-8031 - Hudson XML External Entity Injection

CVE CVE-2015-8031
Description Hudson XML API External Entity Injection Vunerability
Severity Critical
Type Remote Access Vulnerability
Version(s) Affected All versions prior to 3.3.2
Bugzilla Ref 47977

Description

Prior to version 3.3.2 Hudson exhibits a flaw in it's XML API processing that can allow access to potentially sensitive information on the filesystem of the Hudson master server.

Fix

Hudson users should upgrade to Hudson 3.3.2 or above as soon as possible

Credits

The Hudson Team would like to thank Luca Carettoni, Fabian Beterke and Tushar Dalvi from LinkedIn for their work in uncovering and reporting this vulnerability.

Back to the top