Miggo Logo

CVE-2014-2066: Jenkins session fixation vulnerability

6.8

CVSS Score

Basic Information

EPSS Score
0.36659%
Published
5/17/2022
Updated
3/5/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
AV:N/AC:M/Au:N/C:P/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.main:jenkins-coremaven>= 1.533, < 1.5511.551
org.jenkins-ci.main:jenkins-coremaven< 1.532.21.532.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff explicitly shows the vulnerability stemmed from missing session invalidation in the onSuccessfulAuthentication method. Session fixation occurs when attackers can force a user's session ID before authentication. By not invalidating the session after login, Jenkins reused the same session ID post-authentication. The patch adds session.invalidate() to break this chain, confirming this function's role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

S*ssion *ix*tion vuln*r**ility in J*nkins ***or* *.*** *n* LTS ***or* *.***.* *llows r*mot* *tt**k*rs to *ij**k w** s*ssions vi* v**tors involvin* t** "ov*rri**" o* J*nkins *ooki*s.

Reasoning

T** *ommit *i** *xpli*itly s*ows t** vuln*r**ility st*mm** *rom missin* s*ssion inv*li**tion in t** `onSu***ss*ul*ut**nti**tion` m*t*o*. S*ssion *ix*tion o**urs w**n *tt**k*rs **n *or** * us*r's s*ssion I* ***or* *ut**nti**tion. *y not inv*li**tin* t