CVE-2012-0785:
Hash collision attack vulnerability in Jenkins
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.82607%
CWE
-
Published
4/23/2022
Updated
1/30/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.main:jenkins-core | maven | >= 1.425, < 1.447 | 1.447 |
org.jenkins-ci.main:jenkins-core | maven | < 1.424.2 | 1.424.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Java HashMap collisions in parameter processing. While no direct patch diffs are shown, all advisories explicitly attribute the flaw to Winstone's parameter handling. The first patched versions (1.447/LTS 1.424.2) included Winstone updates. Runtime detection would show the parameter parsing function
in stack traces when processing malicious payloads. The winstone.Request.parseParameters
method is the logical entry point where collision-prone hash operations would occur during parameter insertion into vulnerable HashMap implementations.