Miggo Logo

CVE-2021-21624: Incorrect permission checks in Jenkins Role-based Authorization Strategy Plugin may allow accessing some items

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.07093%
Published
5/24/2022
Updated
12/20/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:role-strategymaven<= 3.13.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing parent permission checks in the authorization flow. The commit adds critical parent permission verification logic specifically in the hasPermission method of RoleMap$AclImpl, including new checks for ItemGroup parent permissions when handling READ/DISCOVER requests. The test cases in Security2182Test.java validate() that parent permissions are now required, confirming the vulnerability existed in this authorization pathway. The system property escape hatch further confirms this was the focal point of the security fix.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

It*ms (lik* jo*s) **n ** or**niz** *i*r*r**i**lly in J*nkins, usin* t** *ol**rs Plu*in or som*t*in* simil*r. *n it*m is *xp**t** to ** ****ssi*l* only i* *ll its *n**stors *r* ****ssi*l* *s w*ll. Rol*-**s** *ut*oriz*tion Str*t**y Plu*in *.* *n* **rl

Reasoning

T** vuln*r**ility st*ms *rom missin* p*r*nt p*rmission ****ks in t** *ut*oriz*tion *low. T** *ommit ***s *riti**l p*r*nt p*rmission v*ri*i**tion lo*i* sp**i*i**lly in t** `**sP*rmission` m*t*o* o* `Rol*M*p$**lImpl`, in*lu*in* n*w ****ks *or `It*m*rou