Miggo Logo

CVE-2022-36916: CSRF vulnerability in Jenkins Google Cloud Backup Plugin

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.26361%
Published
7/28/2022
Updated
1/29/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:google-cloud-backupmaven<= 0.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from an HTTP endpoint that 1) lacks permission checks and 2) accepts GET requests. In Jenkins plugin architecture, HTTP endpoints are typically implemented via 'doXxx' methods in Java classes. The combination of missing security checks (checkPermission) and GET method exposure creates CSRF conditions. The function name and location are inferred from standard plugin patterns and the backup functionality described in advisories.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-sit* r*qu*st *or**ry (*SR*) vuln*r**ility in J*nkins *oo*l* *lou* ***kup Plu*in *.* *n* **rli*r *o*s not p*r*orm * p*rmission ****k in *n *TTP *n*point. ***ition*lly, t*is *TTP *n*point *o*s not r*quir* POST r*qu*sts, r*sultin* in * *ross-si

Reasoning

T** vuln*r**ility st*ms *rom *n *TTP *n*point t**t *) l**ks p*rmission ****ks *n* *) ****pts **T r*qu*sts. In J*nkins plu*in *r**it**tur*, *TTP *n*points *r* typi**lly impl*m*nt** vi* '*oXxx' m*t*o*s in J*v* *l*ss*s. T** *om*in*tion o* missin* s**uri