CVE-2022-23111: CSRF vulnerability and missing permission checks in Jenkins Publish Over SSH Plugin
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.68168%
CWE
Published
1/13/2022
Updated
12/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:publish-over-ssh | maven | < 1.23 | 1.23 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from 3 key test connection handlers that:
- Lacked @RequirePOST annotations (CSRF vector)
- Did not enforce proper permissions (allowing Overall/Read users)
- Accepted attacker-controlled server/credential parameters
The security patch specifically added @RequirePOST to these methods, and advisory explicitly mentions missing permission checks in connection test methods. The direct correlation between the vulnerable pattern (CSRF + missing authz) and the patched methods provides high confidence.