CVE-2022-34205: Cross-Site Request Forgery in Jenkins Jianliao Notification Plugin
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.25433%
CWE
Published
6/24/2022
Updated
1/31/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:jianliao | maven | <= 1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The advisory explicitly mentions a form validation() method with missing permission checks and CSRF protection. In Jenkins plugins, connection test endpoints (like doTest* methods) in DescriptorImpl classes are common vectors for such issues. The combination of missing @RequirePOST annotation (allowing GET access) and lack of permission validation matches the described vulnerability pattern. This aligns with Jenkins' security best practices where form validation() methods require POST requests and proper authorization checks.