Miggo Logo

CVE-2022-43402: Jenkins Pipeline: Groovy Plugin allows sandbox protection bypass and arbitrary code execution

10

CVSS Score
3.1

Basic Information

EPSS Score
0.22024%
Published
10/19/2022
Updated
10/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins.workflow:workflow-cpsmaven< 2803.v1a2803.v1a_f77ffcc773

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers on missing sandbox checks for Groovy's implicit type casts. The workflow-cps plugin's CPS transformer and Groovy sandbox interceptor are the primary components handling script execution security. The CpsTransformer's sanitization logic and GroovyInterceptor's cast handling would directly process these operations. The patched version explicitly adds cast interception, indicating these were the vulnerable points. While exact patch details aren't provided, the advisory's technical description of intercepting implicit casts aligns with modifications to these core sandbox enforcement mechanisms.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* s*n**ox *yp*ss vuln*r**ility involvin* v*rious **sts p*r*orm** impli*itly *y t** *roovy l*n*u*** runtim* in J*nkins Pip*lin*: *roovy Plu*in ****.v***_*******_** *n* **rli*r *llows *tt**k*rs wit* p*rmission to ***in* *n* run s*n**ox** s*ripts, in*lu

Reasoning

T** vuln*r**ility **nt*rs on missin* s*n**ox ****ks *or *roovy's impli*it typ* **sts. T** work*low-*ps plu*in's *PS tr*ns*orm*r *n* *roovy s*n**ox int*r**ptor *r* t** prim*ry *ompon*nts **n*lin* s*ript *x**ution s**urity. T** *psTr*ns*orm*r's s*nitiz