CVE-2016-3725:
Missing permissions check in Jenkins Core
4.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/14/2022
Updated
1/30/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.main:jenkins-core | maven | < 2.3 | 2.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on missing permission checks in update site metadata operations. Analysis of security advisories reveals:
- UpdateCenter's HTTP endpoint (doPost) was the entry point for update operations
- UpdateCenterConfiguration handles the actual metadata refresh logic
- Multiple sources (GHSA, CVE, Red Hat) confirm the vulnerability pattern matches these components
- Jenkins security patterns typically require ADMINISTER permission for system configuration changes like update management
- The patch would have added permission checks to these update initiation points