Show plain JSON{"affected_release": [{"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "jenkins-0:1.609.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-broker-0:1.16.2.10-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-broker-util-0:1.36.2.2-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-diy-0:1.26.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-haproxy-0:1.30.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-jbosseap-0:2.26.3.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-jbossews-0:1.34.3.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-jenkins-0:1.28.2.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-mock-0:1.22.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-nodejs-0:1.33.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-perl-0:1.30.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-php-0:1.34.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-python-0:1.33.3.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-ruby-0:1.32.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-logshifter-0:1.10.1.2-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-node-util-0:1.37.2.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rhc-0:1.37.1.2-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-console-0:1.35.2.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-controller-0:1.37.3.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-frontend-apache-vhost-0:0.12.4.2-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-gear-placement-0:0.0.2.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-msg-broker-mcollective-0:1.35.3.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-node-0:1.37.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-routing-daemon-0:0.25.1.2-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}], "bugzilla": {"description": "jenkins: external entity injection via XPath (SECURITY-165)", "id": "1205625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205625"}, "csaw": false, "cvss": {"cvss_base_score": "4.3", "cvss_scoring_vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "status": "verified"}, "cwe": "CWE-611", "details": ["XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via an XPath query.", "It was found that Jenkins' XPath handling allowed XML External Entity (XXE) expansion. A remote attacker with read access could use this flaw to read arbitrary XML files on the Jenkins server."], "name": "CVE-2015-1809", "public_date": "2015-02-27T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2015-1809\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-1809\nhttps://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-02-27"], "threat_severity": "Moderate"}