Miggo Logo

CVE-2020-2310: Missing permission checks in Jenkins Ansible Plugin allow enumerating credentials IDs

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.20475%
Published
5/24/2022
Updated
12/14/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:ansiblemaven<= 1.01.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from form validation methods (doFill*CredentialsIdItems) that implemented credential ID enumeration without proper permission checks. The commit patching CVE-2020-2310 adds authorization checks (item.hasPermission and Jenkins.ADMINISTER checks) to these methods across multiple files. The original vulnerable versions of these methods accepted a Project parameter without validation, while the patched versions use Item + QueryParameter with security checks. These methods directly correspond to the credential enumeration endpoints described in the vulnerability reports.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins *nsi*l* Plu*in *.* *n* **rli*r *o*s not p*r*orm p*rmission ****ks in m*t*o*s impl*m*ntin* *orm v*li**tion. T*is *llows *tt**k*rs wit* Ov*r*ll/R*** p*rmission to *num*r*t* *r***nti*ls I*s o* *r***nti*ls stor** in J*nkins. T*os* **n ** us** *s

Reasoning

T** vuln*r**ility st*ms *rom *orm v*li**tion m*t*o*s (*o*ill**r***nti*lsI*It*ms) t**t impl*m*nt** *r***nti*l I* *num*r*tion wit*out prop*r p*rmission ****ks. T** *ommit p*t**in* `*V*-****-****` ***s *ut*oriz*tion ****ks (`it*m.**sP*rmission` *n* `J*n