Miggo Logo

CVE-2017-1000395: Exposure of Sensitive Information to an Unauthorized Actor in Jenkins

4.3

CVSS Score
3.0

Basic Information

EPSS Score
0.31322%
Published
5/14/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.main:jenkins-coremaven<= 2.73.12.73.2
org.jenkins-ci.main:jenkins-coremaven>= 2.74, <= 2.832.84

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the User.java's getAllProperties() method returning user properties without proper authorization checks. The commit diff shows this method was modified to add a Jenkins.ADMINISTER permission check, confirming the original implementation lacked access control. This matches the advisory's description of exposing user details via /user/(username)/api to non-admins. The test case addition in UserTest.java further validates the security boundary was enforced at this method.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins *.**.* *n* **rli*r, *.** *n* **rli*r provi**s in*orm*tion **out J*nkins us*r ***ounts w*i** is **n*r*lly *v*il**l* to *nyon* wit* Ov*r*ll/R*** p*rmissions vi* t** /us*r/(us*rn*m*)/*pi r*mot* *PI. T*is in*lu*** *.*. J*nkins us*rs' *m*il ***r*s

Reasoning

T** vuln*r**ility st*ms *rom t** `Us*r.j*v*`'s `**t*llProp*rti*s()` m*t*o* r*turnin* us*r prop*rti*s wit*out prop*r *ut*oriz*tion ****ks. T** *ommit *i** s*ows t*is m*t*o* w*s mo*i*i** to *** * `J*nkins.**MINIST*R` p*rmission ****k, *on*irmin* t** or