CVE-2020-2198: Missing permission check in Jenkins Project Inheritance Plugin
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.1451%
CWE
Published
5/24/2022
Updated
1/31/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| hudson.plugins:project-inheritance | maven | <= 21.04.03 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers around the '/getConfigAsXML' endpoint which: 1) Lacks permission checks (should require Item/ExtendedRead/Configure but only checks Item/Read), and 2) Doesn't apply Jenkins' standard secret redaction mechanism. In Jenkins plugin architecture, API endpoints like this are typically implemented as do[MethodName] handlers in Action classes. The combination of missing permission validation and raw secret exposure strongly points to the endpoint handler function being vulnerable. The naming convention 'getConfigAsXML' matches the described vulnerable endpoint, and secret redaction would normally be handled in the XML serialization layer which this function appears to bypass.