Miggo Logo

CVE-2019-10289:
CSRF vulnerability in Jenkins Netsparker Enterprise Scan Plugin

6.5

CVSS Score

Basic Information

EPSS Score
-
Published
5/13/2022
Updated
1/30/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:netsparker-cloud-scanmaven<= 1.1.51.1.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability was in the form validation endpoint doValidateAPI which handled server connections. The patch:

  1. Adds @POST method restriction to prevent CSRF
  2. Introduces Jenkins.ADMINISTER permission check
  3. Changes API token parameter type from String to Secret These changes directly address the CWE-352 CSRF vulnerability by adding security controls that were previously missing. The function name is constructed from the class structure visible in the patch (NCScanBuilder inner class DescriptorImpl).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-sit* r*qu*st *or**ry vuln*r**ility in J*nkins N*tsp*rk*r *lou* S**n Plu*in *.*.* *n* ol**r in t** N*S**n*uil**r.**s*riptorImpl#*oV*li**t**PI *orm v*li**tion m*t*o* *llow** *tt**k*rs to initi*t* * *onn**tion to *n *tt**k*r-sp**i*i** s*rv*r.

Reasoning

T** vuln*r**ility w*s in t** *orm v*li**tion *n*point *oV*li**t**PI w*i** **n*l** s*rv*r *onn**tions. T** p*t**: *. ***s @POST m*t*o* r*stri*tion to pr*v*nt *SR* *. Intro*u**s J*nkins.**MINIST*R p*rmission ****k *. ***n**s *PI tok*n p*r*m*t*r typ* *r