CVE-2018-1000418:
Jenkins HipChat Plugin allows credential capture due to incorrect authorization
8.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.44134%
CWE
Published
5/13/2022
Updated
2/2/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jvnet.hudson.plugins:hipchat | maven | < 2.2.1 | 2.2.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on a form validation
method in HipChatNotifier.java
that improperly handled authorization. Jenkins
plugins typically implement such validation
via descriptor methods like doTestConnection
in *$DescriptorImpl classes. The advisory explicitly states this method was vulnerable due to missing permission checks and CSRF protections (GET instead of POST). The function name follows Jenkins
plugin conventions, and the described exploit mechanism aligns with triggering this test method with malicious parameters.