Miggo Logo

CVE-2022-29002: Cross-Site Request Forgery in XXL-Job

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.3063%
Published
5/24/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.xuxueli:xxl-jobmaven<= 2.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in the user creation endpoint /gaia-job-admin/user/add. In Spring MVC applications, controller methods handling state-changing operations should be protected with CSRF tokens. The absence of @PostAuthorize, @PreAuthorize, or explicit CSRF token validation in the UserController.add method (or equivalent request mapping) makes it vulnerable. The high confidence comes from: 1) The explicit vulnerability description tying CSRF to this endpoint 2) Common Spring security patterns where unprotected POST handlers are CSRF targets 3) The attack impact requiring no existing privileges aligns with missing authorization annotations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-Sit* R*qu*st *or**ry (*SR*) in XXL-Jo* v*.*.* *llows *tt**k*rs to *r*itr*rily *r**t* **ministr*tor ***ounts vi* t** *ompon*nt /**i*-jo*-**min/us*r/***.

Reasoning

T** vuln*r**ility m*ni**sts in t** us*r *r**tion *n*point /**i*-jo*-**min/us*r/***. In Sprin* MV* *ppli**tions, *ontroll*r m*t*o*s **n*lin* st*t*-***n*in* op*r*tions s*oul* ** prot**t** wit* *SR* tok*ns. T** **s*n** o* `@Post*ut*oriz*`, `@Pr**ut*oriz