CVE-2019-16576: Improper Authorization in Jenkins Alauda Kubernetes Suport Plugin
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.14246%
CWE
Published
5/24/2022
Updated
10/26/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.alauda.jenkins.plugins:alauda-kubernetes-support | maven | <= 2.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from a missing permission check in a connection test method. Jenkins plugins typically implement connection tests via doTest* methods in Descriptor classes. The advisory specifically mentions CSRF (lack of POST requirement) and missing authorization checks - both characteristics of unsecured form validation handlers. The pattern matches Jenkins' convention where DescriptorImpl classes handle global configuration and form validation.