An XML external entity processing vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/client/RestApiClient.java that allows attackers with the ability to control the HTTP server (Jenkins) queried in preparation of job import to read arbitrary files, perform a denial of service attack, etc.
[
{
"product": "Jenkins Job Import Plugin",
"vendor": "Jenkins project",
"versions": [
{
"status": "affected",
"version": "2.1 and earlier"
}
]
}
]