CVE-2023-2196:
Jenkins Code Dx Plugin missing permission checks
4.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/16/2023
Updated
1/4/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:codedx | maven | < 4.0.0 | 4.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key issues: 1) Missing permission checks in form validation methods (doCheck* methods in CodeDxPublisher) that should require Item/Configure permission, and 2) Insufficient path validation in Util.java allowing checks outside the workspace. The commit diff shows these methods were modified to add permission checks (@POST + checkPermission) and path containment validation (startsWith(basePath)). These correspond directly to the advisory's description of the vulnerability being caused by missing permission checks and path traversal possibilities.