Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/55737?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55737?format=api", "vulnerability_id": "VCID-vp12-7b76-efg7", "summary": "XXE vulnerability in Jenkins Subversion Plugin\nJenkins Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.\n\nThis allows attackers able to control an agent process to have Jenkins parse a crafted changelog file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.\n\nJenkins Subversion Plugin 2.13.2 disables external entity resolution for its XML parser.", "aliases": [ { "alias": "CVE-2020-2304" }, { "alias": "GHSA-vp5f-8jgw-j53c" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/82726?format=api", "purl": "pkg:maven/org.jenkins-ci.plugins/subversion@2.13.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/subversion@2.13.2" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/82837?format=api", "purl": "pkg:maven/org.jenkins-ci.plugins/subversion@2.13.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vp12-7b76-efg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/subversion@2.13.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/101437?format=api", "purl": "pkg:rpm/redhat/jenkins-2-plugins@3.11.1612862361-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2t2v-bwr2-vugu" }, { "vulnerability": "VCID-62bs-bqfj-bubj" }, { "vulnerability": "VCID-8t18-v493-jbam" }, { "vulnerability": "VCID-myg2-6ghy-hkgm" }, { "vulnerability": "VCID-pdf8-znrf-3ffv" }, { "vulnerability": "VCID-vp12-7b76-efg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@3.11.1612862361-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/101435?format=api", "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.4.1611203637-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-62bs-bqfj-bubj" }, { "vulnerability": "VCID-vp12-7b76-efg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.4.1611203637-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/101438?format=api", "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.5.1610108899-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2t2v-bwr2-vugu" }, { "vulnerability": "VCID-62bs-bqfj-bubj" }, { "vulnerability": "VCID-8t18-v493-jbam" }, { "vulnerability": "VCID-myg2-6ghy-hkgm" }, { "vulnerability": "VCID-pdf8-znrf-3ffv" }, { "vulnerability": "VCID-vp12-7b76-efg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.5.1610108899-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/101436?format=api", "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1608634578-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2t2v-bwr2-vugu" }, { "vulnerability": "VCID-62bs-bqfj-bubj" }, { "vulnerability": "VCID-8t18-v493-jbam" }, { "vulnerability": "VCID-myg2-6ghy-hkgm" }, { "vulnerability": "VCID-pdf8-znrf-3ffv" }, { "vulnerability": "VCID-vp12-7b76-efg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.6.1608634578-1%3Farch=el7" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2304.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2304.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2304", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81812", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81708", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81706", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81733", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81737", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81757", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81744", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81738", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81777", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.8178", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81803", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81674", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01606", "scoring_system": "epss", "scoring_elements": "0.81686", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2304" }, { "reference_url": "https://github.com/jenkinsci/subversion-plugin", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/jenkinsci/subversion-plugin" }, { "reference_url": "https://github.com/jenkinsci/subversion-plugin/commit/83f24081114a465f88d44fc84180d4d9d02c705d", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/jenkinsci/subversion-plugin/commit/83f24081114a465f88d44fc84180d4d9d02c705d" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2304", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2304" }, { "reference_url": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2145", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2145" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2020/11/04/6", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2020/11/04/6" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895939", "reference_id": "1895939", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895939" }, { "reference_url": "https://github.com/advisories/GHSA-vp5f-8jgw-j53c", "reference_id": "GHSA-vp5f-8jgw-j53c", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-vp5f-8jgw-j53c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0034", "reference_id": "RHSA-2021:0034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0038", "reference_id": "RHSA-2021:0038", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0038" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0282", "reference_id": "RHSA-2021:0282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0282" } ], "weaknesses": [ { "cwe_id": 611, "name": "Improper Restriction of XML External Entity Reference", "description": "The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output." }, { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." } ], "exploits": [], "severity_range_score": "4.0 - 6.9", "exploitability": "0.5", "weighted_severity": "6.2", "risk_score": 3.1, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vp12-7b76-efg7" }