Miggo Logo

CVE-2021-21653: Missing Authorization in jenkins xray-connector

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.2005%
Published
6/16/2021
Updated
10/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:xray-connectormaven< 2.4.12.4.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from an unauthenticated HTTP endpoint exposing credential IDs. Jenkins plugins typically implement web endpoints via methods in controller classes annotated with @WebMethod. The advisory specifically calls out credential ID enumeration via an endpoint, which would map to a doListCredentials or similar method in the configuration class handling Xray-Jira integration. The function would appear in runtime profiling when unauthorized users access the credential enumeration endpoint.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins Xr*y - T*st M*n***m*nt *or Jir* Plu*in *.*.* *n* **rli*r *o*s not p*r*orm * p*rmission ****k in *n *TTP *n*point, *llowin* wit* Ov*r*ll/R*** p*rmission to *num*r*t* *r***nti*ls I*s o* *r***nti*ls stor** in J*nkins.

Reasoning

T** vuln*r**ility st*ms *rom *n un*ut**nti**t** *TTP *n*point *xposin* *r***nti*l I*s. J*nkins plu*ins typi**lly impl*m*nt w** *n*points vi* m*t*o*s in *ontroll*r *l*ss*s *nnot*t** wit* @W**M*t*o*. T** **visory sp**i*i**lly **lls out *r***nti*l I* *n