Miggo Logo

CVE-2018-1000420:
Improper authorization vulnerability in Jenkins Mesos Plugin

6.5

CVSS Score
3.0

Basic Information

EPSS Score
0.44789%
Published
5/13/2022
Updated
1/30/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:mesosmaven<= 0.17.10.18

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers on unauthorized credential ID enumeration through missing permission checks in credential listing functionality. Jenkins plugins typically implement credential dropdown population via doFill[...]Items methods. The advisory explicitly states MesosCloud.java contained the vulnerability, and credential enumeration patterns in Jenkins consistently use methods named doFillCredentialIdItems for this purpose. The lack of ADMINISTER permission check in this method before returning credentials matches the described vulnerability mechanism.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n improp*r *ut*oriz*tion vuln*r**ility *xists in J*nkins M*sos Plu*in *.**.* *n* **rli*r in M*sos*lou*.j*v* t**t *llows *tt**k*rs wit* Ov*r*ll/R*** ****ss to o*t*in *r***nti*ls I*s *or *r***nti*ls stor** in J*nkins.

Reasoning

T** vuln*r**ility **nt*rs on un*ut*oriz** *r***nti*l I* *num*r*tion t*rou** missin* p*rmission ****ks in *r***nti*l listin* *un*tion*lity. J*nkins plu*ins typi**lly impl*m*nt *r***nti*l *rop*own popul*tion vi* *o*ill[...]It*ms m*t*o*s. T** **visory *