CVE-2018-1000421:
Server-side request forgery vulnerability in Jenkins Mesos Plugin
6.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.54964%
CWE
Published
5/14/2022
Updated
1/30/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:mesos | maven | <= 0.17.1 | 0.18 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers around a missing permission check in a test connection handler. Jenkins plugin patterns indicate form validation methods typically follow do[Action] naming conventions. The advisory explicitly mentions MesosCloud.java as the vulnerable component and describes test connection functionality as the attack vector. The combination of credential usage and external server connection matches SSRF exploitation patterns through this unsecured endpoint.