Miggo Logo

CVE-2022-34205: Cross-Site Request Forgery in Jenkins Jianliao Notification Plugin

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.25433%
Published
6/24/2022
Updated
1/31/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:jianliaomaven<= 1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly mentions a form validation() method with missing permission checks and CSRF protection. In Jenkins plugins, connection test endpoints (like doTest* methods) in DescriptorImpl classes are common vectors for such issues. The combination of missing @RequirePOST annotation (allowing GET access) and lack of permission validation matches the described vulnerability pattern. This aligns with Jenkins' security best practices where form validation() methods require POST requests and proper authorization checks.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-sit* r*qu*st *or**ry (*SR*) vuln*r**ility in J*nkins Ji*nli*o Noti*i**tion Plu*in *.* *n* **rli*r *llows *tt**k*rs to s*n* *TTP POST r*qu*sts to *n *tt**k*r-sp**i*i** URL.

Reasoning

T** **visory *xpli*itly m*ntions * *orm `v*li**tion()` m*t*o* wit* missin* p*rmission ****ks *n* *SR* prot**tion. In J*nkins `plu*ins`, *onn**tion t*st *n*points (lik* `*oT*st*` m*t*o*s) in `**s*riptorImpl` *l*ss*s *r* *ommon v**tors *or su** issu*s.