CVE-2023-24447: Cross-site request forgery vulnerability in Jenkins RabbitMQ Consumer Plugin
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.40969%
CWE
Published
1/26/2023
Updated
2/3/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:rabbitmq-consumer | maven | <= 2.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly mentions: 1) Missing permission check in form validation methods, and 2) CSRF vulnerability due to missing POST requirement. In Jenkins plugins, form validation methods like doCheck* are typically vulnerable to CSRF when not protected by @RequirePOST. The connection validation endpoint for AMQP(S) URLs would logically be implemented in the descriptor's connection check method. While exact code isn't available, Jenkins security patterns strongly suggest this implementation location.