CVE Vulnerabilities

CVE-2017-12621

Improper Restriction of XML External Entity Reference

Published: Sep 28, 2017 | Modified: Apr 20, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
9.8 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

During Jelly (xml) file parsing with Apache Xerces, if a custom doctype entity is declared with a SYSTEM entity with a URL and that entity is used in the body of the Jelly file, during parser instantiation the parser will attempt to connect to said URL. This could lead to XML External Entity (XXE) attacks in Apache Commons Jelly before 1.0.1.

Weakness

The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

Affected Software

Name Vendor Start Version End Version
Commons_jelly Apache * 1.0.1 (excluding)
Jenkins-commons-jelly Ubuntu esm-apps/xenial *
Jenkins-commons-jelly Ubuntu trusty *
Jenkins-commons-jelly Ubuntu upstream *
Jenkins-commons-jelly Ubuntu xenial *

Potential Mitigations

References