Red Hat Bugzilla – Bug 1205632
CVE-2015-1811 jenkins: External entity processing in XML can reveal sensitive local files (SECURITY-167)
Last modified: 2015-09-30 12:43:31 EDT
This vulnerability allows attackers to create malicious XML documents and feed that into Jenkins, which causes Jenkins to retrieve arbitrary XML document on the server, resulting in the exposure of sensitive information inside/outside Jenkins. External References: https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-02-27
Created jenkins tracking bugs for this issue: Affects: fedora-all [bug 1205637]
jenkins-1.590-3.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
jenkins-1.606-1.fc22, jffi-1.2.7-5.fc22, jenkins-executable-war-1.29-4.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: RHEL 6 Version of OpenShift Enterprise 2.2 Via RHSA-2015:1844 https://rhn.redhat.com/errata/RHSA-2015-1844.html