Miggo Logo

CVE-2018-1000606: URLTrigger Plugin server-side request forgery vulnerability

6.5

CVSS Score
3.0

Basic Information

EPSS Score
0.07093%
Published
5/14/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:urltriggermaven<= 0.410.43

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The key vulnerability stemmed from the doCheckURL form validation method making actual HTTP requests to user-controlled URLs. The commit diff shows this method originally contained code that created a Client object and executed client.resource(value).get(ClientResponse.class), which directly enabled SSRF. The patching commit (aec43e3) explicitly removes this network call, replacing it with a warning about parameterized URLs. The CVE description specifically calls out that 'this form validation method no longer connects to a user provided URL' in the fixed version, confirming this function's role.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* s*rv*r-si** r*qu*st *or**ry vuln*r**ility *xists in J*nkins URLTri***r Plu*in *.** *n* **rli*r in URLTri***r.j*v* t**t *llows *tt**k*rs wit* Ov*r*ll/R*** ****ss to **us* J*nkins to s*n* * **T r*qu*st to * sp**i*i** URL. *s o* v*rsion *.**, t*is *or

Reasoning

T** k*y vuln*r**ility st*mm** *rom t** `*o****kURL` *orm v*li**tion m*t*o* m*kin* **tu*l *TTP r*qu*sts to us*r-*ontroll** URLs. T** *ommit *i** s*ows t*is m*t*o* ori*in*lly *ont*in** *o** t**t *r**t** * `*li*nt` o*j**t *n* *x**ut** `*li*nt.r*sour**(v