Miggo Logo

CVE-2012-0785:
Hash collision attack vulnerability in Jenkins

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.82607%
CWE
-
Published
4/23/2022
Updated
1/30/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.main:jenkins-coremaven>= 1.425, < 1.4471.447
org.jenkins-ci.main:jenkins-coremaven< 1.424.21.424.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Java HashMap collisions in parameter processing. While no direct patch diffs are shown, all advisories explicitly attribute the flaw to Winstone's parameter handling. The first patched versions (1.447/LTS 1.424.2) included Winstone updates. Runtime detection would show the parameter parsing function in stack traces when processing malicious payloads. The winstone.Request.parseParameters method is the logical entry point where collision-prone hash operations would occur during parameter insertion into vulnerable HashMap implementations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**s* *ollision *tt**k vuln*r**ility in J*nkins ***or* *.***, J*nkins LTS ***or* *.***.*, *n* J*nkins *nt*rpris* *y *lou****s *.***.x ***or* *.***.*.* *n* *.***.x ***or* *.***.*.** *oul* *llow r*mot* *tt**k*rs to **us* * *onsi**r**l* *PU lo**, *k* "t*

Reasoning

T** vuln*r**ility st*ms *rom J*v* **s*M*p *ollisions in p*r*m*t*r pro**ssin*. W*il* no *ir**t p*t** *i**s *r* s*own, *ll **visori*s *xpli*itly *ttri*ut* t** *l*w to Winston*'s p*r*m*t*r **n*lin*. T** *irst p*t**** v*rsions (*.***/LTS *.***.*) in*lu**