Miggo Logo

CVE-2017-1000390: Jenkins Multijob plugin did not check permissions in the Resume Build action

4.3

CVSS Score
3.0

Basic Information

EPSS Score
0.03587%
Published
5/13/2022
Updated
1/31/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:jenkins-multijob-pluginmaven<= 1.251.26

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing authorization in the Resume Build handler. Jenkins typically implements HTTP action handlers via 'doXxx' methods in controller classes. The advisory explicitly states the Resume Build action lacked permission checks until 1.26, indicating the vulnerable method is the resume action handler (doResume) in MultiJobBuild class. This matches Jenkins plugin architecture patterns where security checks are implemented in controller methods handling sensitive actions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins Multijo* plu*in v*rsion *.** *n* **rli*r *i* not ****k p*rmissions in t** R*sum* *uil* **tion, *llowin* *nyon* wit* Jo*/R*** p*rmission to r*sum* t** *uil*. Multijo* plu*in *.** intro*u*** * p*rmission ****k r*quirin* Ov*r*ll/**minist*r. T*is

Reasoning

T** vuln*r**ility st*ms *rom missin* *ut*oriz*tion in t** R*sum* *uil* **n*l*r. J*nkins typi**lly impl*m*nts `*TTP` **tion **n*l*rs vi* '*oXxx' m*t*o*s in *ontroll*r *l*ss*s. T** **visory *xpli*itly st*t*s t** R*sum* *uil* **tion l**k** p*rmission **