CVE-2017-1000402:
Jenkins Swarm Plugin Client vulnerable to man-in-the-middle attacks
5.9
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.07663%
CWE
Published
5/14/2022
Updated
2/2/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:swarm-client | maven | <= 3.4 | 3.5 |
org.jvnet.hudson.plugins:swarm-plugin | maven | <= 1.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises from the Swarm Client's use of Apache Commons HttpClient
3.1's EasySSLProtocolSocketFactory
, which lacks proper hostname verification. The key functions are: 1) The socket factory's createSocket
method that implements the insecure validation, 2) The protocol registration that enables the vulnerable factory for HTTPS, and 3) The Swarm Client's HTTP
client initialization that uses these components. These functions would appear in stack traces during SSL handshake and HTTP
client setup when connecting to a Jenkins
master, which is when MITM attacks would be triggered.