Miggo Logo

CVE-2017-1000503: Race Condition in Jenkins

8.1

CVSS Score
3.0

Basic Information

EPSS Score
0.85726%
Published
5/14/2022
Updated
3/4/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.main:jenkins-coremaven>= 2.81, <= 2.89.12.89.2
org.jenkins-ci.main:jenkins-coremaven>= 2.90, <= 2.942.95

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper synchronization in Jenkins' Reactor initialization process. The patch adds attains(COMPLETED) to two Executable tasks in Jenkins.java, indicating these anonymous inner class implementations of Executable.run() were vulnerable. These tasks handled security-critical initialization steps (cleaning obsolete items and finalizing setup) but could execute out of order due to missing synchronization constraints, leading to incomplete security configuration. The direct correlation between the patch and security advisory confirms these functions' role in the race condition.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* r*** *on*ition *urin* J*nkins *.** t*rou** *.** (in*lusiv*); *.**.* st*rtup *oul* r*sult in t** wron* or**r o* *x**ution o* *omm*n*s *urin* initi*liz*tion. T*is *oul* in r*r* **s*s r*sult in **ilur* to initi*liz* t** s*tup wiz*r* on t** *irst st*rt

Reasoning

T** vuln*r**ility st*ms *rom improp*r syn**roniz*tion in J*nkins' R***tor initi*liz*tion pro**ss. T** p*t** ***s `*tt*ins(*OMPL*T**)` to two *x**ut**l* t*sks in `J*nkins.j*v*`, in*i**tin* t**s* *nonymous inn*r *l*ss impl*m*nt*tions o* `*x**ut**l*.run