CVE-2020-2234: Missing permission check in Jenkins Pipeline Maven Integration Plugin allow capturing credentials
7.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.14756%
CWE
Published
5/24/2022
Updated
10/26/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:pipeline-maven | maven | < 3.8.3 | 3.8.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on a form validation method for JDBC URL/credentials testing that failed to: 1) Check Job/Configure permissions (CWE-285/862), and 2) Enforce POST requests (CSRF). The descriptor pattern in Jenkins plugins typically uses 'doValidate[Parameter]' methods for form validation. The advisory explicitly states the fixed version added POST enforcement and permission checks to 'the affected form validation method', strongly indicating a method in the plugin's configuration descriptor class (GlobalPipelineMavenConfig$DescriptorImpl) handling JDBC validation.