Miggo Logo

CVE-2020-2202:
Users with Overall/Read access could enumerate credentials IDs in Jenkins Fortify on Demand Plugin

4.3

CVSS Score

Basic Information

EPSS Score
-
Published
5/24/2022
Updated
12/22/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:fortify-on-demand-uploadermaven<= 6.0.06.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from multiple credential enumeration functions in FodGlobalDescriptor.java that lacked proper permission checks (Jenkins.ADMINISTER). The commit 28932f7 added these checks, confirming these functions were previously vulnerable. The functions directly interact with credential storage and were accessible to users with only Overall/Read permissions, enabling ID enumeration. The high confidence comes from explicit permission check additions in the patch diff and CWE-285/862 mappings.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*orti*y on **m*n* Plu*in provi**s * list o* *ppli***l* *r***nti*ls I*s to *llow us*rs *on*i*urin* t** plu*in to s*l**t t** on* to us*. T*is *un*tion*lity *o*s not *orr**tly ****k p*rmissions in *orti*y on **m*n* Plu*in *.*.* *n* **rli*r, *llowin* *n

Reasoning

T** vuln*r**ility st*mm** *rom multipl* *r***nti*l *num*r*tion *un*tions in *o**lo**l**s*riptor.j*v* t**t l**k** prop*r p*rmission ****ks (J*nkins.**MINIST*R). T** *ommit ******* ***** t**s* ****ks, *on*irmin* t**s* *un*tions w*r* pr*viously vuln*r**