CVE-2023-30522: Jenkins Fogbugz Plugin has missing permissions check
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.0795%
CWE
Published
4/12/2023
Updated
4/21/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:fogbugz | maven | <= 2.2.17 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly mentions an unprotected webhook endpoint at /fbTrigger/ that allows triggering builds with only Item/Read permission. In Jenkins plugin architecture:
- Web endpoints are typically implemented via do* methods in Action classes
- The missing permission check suggests absence of required authorization calls like Jenkins.get().checkPermission(Item.BUILD)
- The 'jobname' parameter handling indicates a function processing HTTP parameters to resolve and trigger jobs
- The CWE-862 classification confirms this is an authorization layer omission in the endpoint handler