Miggo Logo

CVE-2022-34807: Plaintext Storage of a Password in Jenkins Elasticsearch Query Plugin

3.3

CVSS Score
3.1

Basic Information

EPSS Score
0.67155%
Published
7/1/2022
Updated
6/30/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:elasticsearch-querymaven<= 1.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper credential handling in two key areas: 1) The descriptor's configure method persists configuration data without encrypting the password field. 2) The password field is stored/retrieved as plaintext rather than using Jenkins' secure credential storage mechanisms (Secret class). This matches Jenkins plugin vulnerability patterns where sensitive fields aren't properly marked as @DataBoundConstructor parameters with Secret serialization.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins *l*sti*s**r** Qu*ry Plu*in *.* *n* **rli*r stor*s * p*sswor* un*n*rypt** in its *lo**l *on*i*ur*tion *il* `or*.j*nkins*i.plu*ins.*l*sti*s**r**qu*ry.*l*sti*s**r**Qu*ry*uil**r.xml` on t** J*nkins *ontroll*r w**r* it **n ** vi*w** *y us*rs wit*

Reasoning

T** vuln*r**ility st*ms *rom improp*r *r***nti*l **n*lin* in two k*y *r**s: *) T** **s*riptor's *on*i*ur* m*t*o* p*rsists *on*i*ur*tion **t* wit*out *n*ryptin* t** p*sswor* *i*l*. *) T** p*sswor* *i*l* is stor**/r*tri*v** *s pl*int*xt r*t**r t**n usi