Miggo Logo

CVE-2023-24437: Cross-site request forgery vulnerability in Jenkins JIRA Pipeline Steps Plugin

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.39212%
Published
1/26/2023
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:jira-stepsmaven<= 2.0.165.v8846cf59f3db

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly states that form validation methods lack permission checks and CSRF protection. In Jenkins plugins, form validation is typically implemented through doCheck* methods in DescriptorImpl classes. These methods would handle validation of credentials/URL inputs but were improperly secured. The combination of missing @RequirePOST annotation (allowing GET access) and missing permission checks matches the described attack vector where attackers can force Jenkins to connect to malicious URLs using stored credentials.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-sit* r*qu*st *or**ry (*SR*) vuln*r**ility in J*nkins JIR* Pip*lin* St*ps Plu*in *.*.***.v************ *n* **rli*r *llows *tt**k*rs to *onn**t to *n *tt**k*r-sp**i*i** URL usin* *tt**k*r-sp**i*i** *r***nti*ls I*s o*t*in** t*rou** *not**r m*t*o

Reasoning

T** **visory *xpli*itly st*t*s t**t *orm v*li**tion m*t*o*s l**k p*rmission ****ks *n* *SR* prot**tion. In J*nkins plu*ins, *orm v*li**tion is typi**lly impl*m*nt** t*rou** `*o****k*` m*t*o*s in `**s*riptorImpl` *l*ss*s. T**s* m*t*o*s woul* **n*l* v*