Miggo Logo

CVE-2019-10464: Jenkins Deploy WebLogic Plugin cross-site request forgery vulnerability

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.30259%
Published
5/24/2022
Updated
10/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:weblogic-deployer-pluginmaven<= 4.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from form validation methods that 1) don't perform permission checks (allowing Overall/Read users to execute them) and 2) accept non-POST requests (enabling CSRF). In Jenkins plugins, form validation is typically implemented through doCheck* methods in Descriptor classes. The combination of missing permission validation (SECURITY-820) and missing POST requirement (CWE-352) indicates these methods are the vulnerable entry points. The file path is inferred from standard Jenkins plugin structure and WebLogic Deployer naming conventions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins**ploy W**Lo*i* Plu*in *o*s not p*r*orm p*rmission ****ks on * m*t*o* impl*m*ntin* *orm v*li**tion. T*is *llows us*rs wit* Ov*r*ll/R*** ****ss to J*nkins to s*n* *n *TTP **** r*qu*st to * us*r-sp**i*i** URL, or *on*irm t** *xist*n** o* *ny *il

Reasoning

T** vuln*r**ility st*ms *rom *orm v*li**tion m*t*o*s t**t *) *on't p*r*orm p*rmission ****ks (*llowin* Ov*r*ll/R*** us*rs to *x**ut* t**m) *n* *) ****pt non-POST r*qu*sts (*n**lin* *SR*). In J*nkins plu*ins, *orm v*li**tion is typi**lly impl*m*nt** t