CVE-2019-1003027: SSRF vulnerability due to missing permission check in Jenkins OctopusDeploy Plugin
4.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.06625%
CWE
Published
5/13/2022
Updated
1/30/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| hudson.plugins.octopusdeploy:octopusdeploy | maven | <= 1.8.1 | 1.9.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from a form validation method in OctopusDeployPlugin.java that handled URL connectivity checks. Jenkins security advisory GHSA-5v2j-w677-j4mp explicitly states this was a form validation method missing two critical security controls:
- No permission check beyond Overall/Read
- Accepted GET requests (CSRF vector)
Jenkins plugin conventions indicate form validation methods follow the 'doCheck[ParameterName]' naming pattern. The URL parameter being validated (likely 'octopusUrl') would make 'doCheckOctopusUrl' the vulnerable method. This matches the advisory's description of the attack vector allowing SSRF through URL connectivity tests. The function would appear in runtime profiling when attackers trigger the vulnerable endpoint to perform SSRF.