Miggo Logo

CVE-2022-25201:
Missing permission checks in Jenkins Checkmarx Plugin allow capturing credentials

4.2

CVSS Score

Basic Information

EPSS Score
-
Published
2/16/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.checkmarx.jenkins:checkmarxmaven< 2022.1.32022.1.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers on missing permission checks in HTTP endpoints. Jenkins plugins typically implement form validation and connection testing through do* methods in Descriptor classes. The security advisory specifically mentions endpoints that should require POST requests and admin permissions, which aligns with common patterns like doTestConnection and doVerifyCredentials. The patch release notes mention fixing CSRF and permission issues, confirming these authentication-related endpoints were vulnerable. The CxDescriptor class is the logical location for these methods based on standard Jenkins plugin architecture.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

****km*rx Plu*in ****.*.* *n* **rli*r *o*s not p*r*orm p*rmission ****ks in s*v*r*l *TTP *n*points. T*is *llows *tt**k*rs wit* Ov*r*ll/R*** p*rmission to *onn**t to *n *tt**k*r-sp**i*i** w**s*rv*r usin* *tt**k*r-sp**i*i** *r***nti*ls I*s o*t*in** t*

Reasoning

T** vuln*r**ility **nt*rs on missin* p*rmission ****ks in *TTP *n*points. J*nkins plu*ins typi**lly impl*m*nt *orm v*li**tion *n* *onn**tion t*stin* t*rou** *o* m*t*o*s in **s*riptor *l*ss*s. T** s**urity **visory sp**i*i**lly m*ntions *n*points t**t