SECURITY-2330 / CVE-2021-21669
Generic Webhook Trigger Plugin 1.72 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers with the ability to call webhooks configured to extract parameters using XPath to have Jenkins parse a crafted XML request body that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Generic Webhook Trigger Plugin 1.74 disables external entity resolution for its XML parser.
The Jenkins project would like to thank the reporters for discovering and reporting these vulnerabilities:
Kevin Guerroudj, Justin Philip, Marc Heyries for SECURITY-2330
Generic Webhook Trigger Plugin should be updated to version 1.74
These versions include fixes to the vulnerabilities described above. All prior versions are considered to be affected by these vulnerabilities unless otherwise indicated.