CVE-2023-32999: Jenkins AppSpider Plugin missing permission check
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3397%
CWE
Published
5/16/2023
Updated
11/7/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.rapid7:jenkinsci-appspider-plugin | maven | <= 1.0.15 | 1.0.16 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly mentions a missing permission check in a form validation
method and CSRF vulnerability due to missing POST
enforcement. In Jenkins
plugins, form validation
methods typically follow the 'do[Action]' naming pattern in DescriptorImpl
classes. The combination of credential validation
functionality and the described attack vector strongly suggests this method was responsible for server connection validation
. The high confidence comes from: 1) Standard Jenkins
plugin architecture patterns 2) Direct match with the vulnerability's technical description 3) The patched version's requirements aligning with typical fixes for such methods (adding @RequirePOST
and permission checks)