CVE-2017-1000354: Improper Authentication in Jenkins
8.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.58654%
CWE
Published
5/14/2022
Updated
4/19/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.main:jenkins-core | maven | >= 2.50, <= 2.56 | 2.57 |
org.jenkins-ci.main:jenkins-core | maven | <= 2.46.1 | 2.46.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from how authentication data was stored and validated. The pre-patch implementation in ClientAuthenticationCache:
- get() blindly trusted the stored encrypted username without MAC validation
- set() persisted only the encrypted username without a cryptographic integrity check
- The lack of HMAC allowed substitution attacks when combined with secret decryption capabilities
- The test case in ClientAuthenticationCacheTest.java demonstrates how modifying the stored value could bypass authentication
- The fix introduced HMACConfidentialKey to bind the username to a MAC, making tampering detectable