CVE-2019-10446: Jenkins Cadence vManager Plugin disables SSL/TLS and hostname verification
8.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.15335%
CWE
Published
5/24/2022
Updated
1/31/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:vmanager-plugin | maven | < 2.7.1 | 2.7.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from the original implementation of fixUntrustCertificate(), which used a custom X509TrustManager that skipped certificate validation and a HostnameVerifier that always returned true. The commit diff shows this function was replaced with a safer Apache HttpClient implementation that localizes the SSL bypass (via NoopHostnameVerifier and TrustSelfSignedStrategy) only when explicitly enabled by the user. The pre-patch version's global HttpsURLConnection.setDefaultSSLSocketFactory() and setDefaultHostnameVerifier() calls made the entire JVM vulnerable to MITM attacks.