Miggo Logo

CVE-2022-36917:
Jenkins Google Cloud Backup Plugin allows attackers with Overall/Read permission to request a manual backup.

4.3

CVSS Score

Basic Information

EPSS Score
-
Published
7/28/2022
Updated
11/5/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:google-cloud-backupmaven<= 0.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from an HTTP endpoint that 1) lacks authorization checks for manual backup initiation and 2) accepts GET requests. In Jenkins plugin architecture, HTTP endpoints are typically implemented via do* methods (doPost/doGet) in Java classes. The combination of missing permission validation (CWE-862) and CSRF vulnerability strongly suggests the backup trigger handler doesn't validate user permissions properly and lacks POST method enforcement. The naming follows Jenkins plugin conventions where management actions are often handled via ManagementLink implementations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins *oo*l* *lou* ***kup Plu*in *.* *n* **rli*r *o*s not p*r*orm * p*rmission ****k in *n *TTP *n*point. T*is *llows *tt**k*rs wit* Ov*r*ll/R*** p*rmission to r*qu*st * m*nu*l ***kup. ***ition*lly, t*is *TTP *n*point *o*s not r*quir* POST r*qu*s

Reasoning

T** vuln*r**ility st*ms *rom *n *TTP *n*point t**t *) l**ks *ut*oriz*tion ****ks *or m*nu*l ***kup initi*tion *n* *) ****pts **T r*qu*sts. In J*nkins plu*in *r**it**tur*, *TTP *n*points *r* typi**lly impl*m*nt** vi* *o* m*t*o*s (*oPost/*o**t) in J*v*