Miggo Logo

CVE-2023-32978: Jenkins LDAP Plugin vulnerable to Cross-Site Request Forgery

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.34359%
Published
5/16/2023
Updated
1/4/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:ldapmaven< 676.vfa676.vfa

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows the addition of @POST annotation to doCheckServer method and checkMethod='post' in the Jelly form configuration. This directly addresses the CSRF vulnerability by requiring POST requests for server validation. The advisory explicitly mentions this form validation method as the attack vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins L**P Plu*in ***.v***********_*_ *n* **rli*r *o*s not r*quir* POST r*qu*sts *or * *orm v*li**tion m*t*o*, r*sultin* in * *ross-sit* r*qu*st *or**ry (*SR*) vuln*r**ility. T*is vuln*r**ility *llows *tt**k*rs to *onn**t to *n *tt**k*r-sp**i*i**

Reasoning

T** *ommit *i** s*ows t** ***ition o* @POST *nnot*tion to `*o****kS*rv*r` m*t*o* *n* `****kM*t*o*='post'` in t** J*lly *orm *on*i*ur*tion. T*is *ir**tly ***r*ss*s t** *SR* vuln*r**ility *y r*quirin* `POST` r*qu*sts *or s*rv*r v*li**tion. T** **visory