Miggo Logo

CVE-2017-1000402:
Jenkins Swarm Plugin Client vulnerable to man-in-the-middle attacks

5.9

CVSS Score
3.0

Basic Information

EPSS Score
0.07663%
Published
5/14/2022
Updated
2/2/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:swarm-clientmaven<= 3.43.5
org.jvnet.hudson.plugins:swarm-pluginmaven<= 1.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability arises from the Swarm Client's use of Apache Commons HttpClient 3.1's EasySSLProtocolSocketFactory, which lacks proper hostname verification. The key functions are: 1) The socket factory's createSocket method that implements the insecure validation, 2) The protocol registration that enables the vulnerable factory for HTTPS, and 3) The Swarm Client's HTTP client initialization that uses these components. These functions would appear in stack traces during SSL handshake and HTTP client setup when connecting to a Jenkins master, which is when MITM attacks would be triggered.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins Sw*rm Plu*in *li*nt *.* *n* **rli*r *un*l** * v*rsion o* t** *ommons-*ttp*li*nt li*r*ry wit* t** vuln*r**ility *V*-****-**** t**t in*orr**tly v*ri*i** SSL **rti*i**t*s, m*kin* it sus**pti*l* to m*n-in-t**-mi**l* *tt**ks.

Reasoning

T** vuln*r**ility *ris*s *rom t** Sw*rm *li*nt's us* o* *p**** *ommons `*ttp*li*nt` *.*'s `**sySSLProto*olSo*k*t***tory`, w*i** l**ks prop*r *ostn*m* v*ri*i**tion. T** k*y *un*tions *r*: *) T** so*k*t ***tory's `*r**t*So*k*t` m*t*o* t**t impl*m*nts t