Show plain JSON{"affected_release": [{"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "jenkins-0:1.609.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-broker-0:1.16.2.10-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-broker-util-0:1.36.2.2-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-diy-0:1.26.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-haproxy-0:1.30.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-jbosseap-0:2.26.3.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-jbossews-0:1.34.3.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-jenkins-0:1.28.2.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-mock-0:1.22.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-nodejs-0:1.33.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-perl-0:1.30.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-php-0:1.34.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-python-0:1.33.3.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-cartridge-ruby-0:1.32.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-logshifter-0:1.10.1.2-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "openshift-origin-node-util-0:1.37.2.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rhc-0:1.37.1.2-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-console-0:1.35.2.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-controller-0:1.37.3.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-frontend-apache-vhost-0:0.12.4.2-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-gear-placement-0:0.0.2.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-msg-broker-mcollective-0:1.35.3.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-node-0:1.37.1.1-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}, {"advisory": "RHSA-2015:1844", "cpe": "cpe:/a:redhat:openshift:2.0::el6", "package": "rubygem-openshift-origin-routing-daemon-0:0.25.1.2-1.el6op", "product_name": "Red Hat OpenShift Enterprise 2.2", "release_date": "2015-09-30T00:00:00Z"}], "bugzilla": {"description": "jenkins: External entity processing in XML can reveal sensitive local files (SECURITY-167)", "id": "1205632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205632"}, "csaw": false, "cvss": {"cvss_base_score": "3.5", "cvss_scoring_vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "status": "verified"}, "cwe": "CWE-611", "details": ["XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via a crafted XML document.", "It was found that Jenkins' XML handling allowed XML External Entity (XXE) expansion. A remote attacker with the ability to pass XML data to Jenkins could use this flaw to read arbitrary XML files on the Jenkins server."], "name": "CVE-2015-1811", "public_date": "2015-02-27T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2015-1811\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-1811\nhttps://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-02-27"], "threat_severity": "Moderate"}