Miggo Logo

CVE-2022-41234: Missing webhook endpoint authorization in Jenkins Rundeck Plugin

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.64327%
Published
9/22/2022
Updated
2/2/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:rundeckmaven< 3.6.123.6.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability explicitly concerns missing authorization on the /plugin/rundeck/webhook/ endpoint. In Jenkins plugin architecture, HTTP endpoints are typically handled by servlet classes with do* methods. The webhook handler function would be responsible for processing these requests. The absence of permission checks (specifically for Job/Build permission rather than just Overall/Read) in this endpoint's handler directly enables the vulnerability. While exact implementation details aren't available, the pattern matches Jenkins plugin vulnerability patterns where security checks are missing from endpoint handlers.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins Run***k Plu*in *.*.** *n* **rli*r *o*s not prot**t ****ss to t** `/plu*in/run***k/w***ook/` *n*point, *llowin* us*rs wit* Ov*r*ll/R*** p*rmission to tri***r jo*s t**t *r* *on*i*ur** to ** tri***r**l* vi* Run***k.

Reasoning

T** vuln*r**ility *xpli*itly *on**rns missin* *ut*oriz*tion on t** /plu*in/run***k/w***ook/ *n*point. In J*nkins plu*in *r**it**tur*, *TTP *n*points *r* typi**lly **n*l** *y s*rvl*t *l*ss*s wit* *o* m*t*o*s. T** w***ook **n*l*r *un*tion woul* ** r*sp