Miggo Logo

CVE-2018-1000418:
Jenkins HipChat Plugin allows credential capture due to incorrect authorization

8.8

CVSS Score
3.0

Basic Information

EPSS Score
0.44134%
Published
5/13/2022
Updated
2/2/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jvnet.hudson.plugins:hipchatmaven< 2.2.12.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers on a form validation method in HipChatNotifier.java that improperly handled authorization. Jenkins plugins typically implement such validation via descriptor methods like doTestConnection in *$DescriptorImpl classes. The advisory explicitly states this method was vulnerable due to missing permission checks and CSRF protections (GET instead of POST). The function name follows Jenkins plugin conventions, and the described exploit mechanism aligns with triggering this test method with malicious parameters.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n improp*r *ut*oriz*tion vuln*r**ility *xists in J*nkins *ip***t Plu*in *.*.* *n* **rli*r in *ip***tNoti*i*r.j*v* t**t *llows *tt**k*rs wit* Ov*r*ll/R*** ****ss to s*n* t*st noti*i**tions to *n *tt**k*r-sp**i*i** *ip***t s*rv*r wit* *tt**k*r-sp**i*i

Reasoning

T** vuln*r**ility **nt*rs on * *orm `v*li**tion` m*t*o* in `*ip***tNoti*i*r.j*v*` t**t improp*rly **n*l** *ut*oriz*tion. `J*nkins` plu*ins typi**lly impl*m*nt su** `v*li**tion` vi* **s*riptor m*t*o*s lik* `*oT*st*onn**tion` in *$**s*riptorImpl *l*ss*