Miggo Logo

CVE-2022-45394: Missing permission check in Jenkins Delete log Plugin

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.26226%
Published
11/16/2022
Updated
10/30/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:delete-log-pluginmaven<= 1.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from an unauthenticated HTTP endpoint handling log deletion operations. Jenkins plugin security typically requires explicit permission checks using methods like checkPermission() or requiresPermission annotations. The advisory explicitly states the missing authorization check for the log deletion operation, which would normally be implemented in the handler method for this endpoint (commonly named doDeleteLog in Jenkins plugin conventions). The combination of 1) destructive operation (log deletion) 2) missing permission check 3) CSRF vulnerability (implied by HTTP method handling) strongly indicates the handler method for the deletion endpoint is the vulnerable function.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* missin* p*rmission ****k in J*nkins **l*t* lo* Plu*in *.* *n* **rli*r *llows *tt**k*rs wit* It*m/R*** p*rmission to **l*t* *uil* lo*s. *s o* pu*li**tion o* t*is **visory, t**r* is no *ix.

Reasoning

T** vuln*r**ility st*ms *rom *n un*ut**nti**t** *TTP *n*point **n*lin* lo* **l*tion op*r*tions. J*nkins plu*in s**urity typi**lly r*quir*s *xpli*it p*rmission ****ks usin* m*t*o*s lik* ****kP*rmission() or r*quir*sP*rmission *nnot*tions. T** **visory