Miggo Logo

CVE-2022-23111: CSRF vulnerability and missing permission checks in Jenkins Publish Over SSH Plugin

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.68168%
Published
1/13/2022
Updated
12/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:publish-over-sshmaven< 1.231.23

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from 3 key test connection handlers that:

  1. Lacked @RequirePOST annotations (CSRF vector)
  2. Did not enforce proper permissions (allowing Overall/Read users)
  3. Accepted attacker-controlled server/credential parameters

The security patch specifically added @RequirePOST to these methods, and advisory explicitly mentions missing permission checks in connection test methods. The direct correlation between the vulnerable pattern (CSRF + missing authz) and the patched methods provides high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-sit* r*qu*st *or**ry (*SR*) vuln*r**ility in J*nkins Pu*lis* Ov*r SS* Plu*in *.** *n* **rli*r *llows *tt**k*rs to *onn**t to *n *tt**k*r-sp**i*i** SS* s*rv*r usin* *tt**k*r-sp**i*i** *r***nti*ls.

Reasoning

T** vuln*r**ility st*mm** *rom * k*y t*st *onn**tion **n*l*rs t**t: *. L**k** @R*quir*POST *nnot*tions (*SR* v**tor) *. *i* not *n*or** prop*r p*rmissions (*llowin* Ov*r*ll/R*** us*rs) *. ****pt** *tt**k*r-*ontroll** s*rv*r/*r***nti*l p*r*m*t*rs T**