Miggo Logo

CVE-2023-32999: Jenkins AppSpider Plugin missing permission check

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.3397%
Published
5/16/2023
Updated
11/7/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.rapid7:jenkinsci-appspider-pluginmaven<= 1.0.151.0.16

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly mentions a missing permission check in a form validation method and CSRF vulnerability due to missing POST enforcement. In Jenkins plugins, form validation methods typically follow the 'do[Action]' naming pattern in DescriptorImpl classes. The combination of credential validation functionality and the described attack vector strongly suggests this method was responsible for server connection validation. The high confidence comes from: 1) Standard Jenkins plugin architecture patterns 2) Direct match with the vulnerability's technical description 3) The patched version's requirements aligning with typical fixes for such methods (adding @RequirePOST and permission checks)

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins *ppSpi**r Plu*in *.*.** *n* **rli*r *o*s not p*r*orm * p*rmission ****k in * m*t*o* impl*m*ntin* *orm v*li**tion. T*is *llows *tt**k*rs wit* Ov*r*ll/R*** p*rmission to *onn**t to *n *tt**k*r-sp**i*i** URL *n* s*n* *n *TTP POST r*qu*st wit* *

Reasoning

T** vuln*r**ility **s*ription *xpli*itly m*ntions * missin* p*rmission ****k in * *orm `v*li**tion` m*t*o* *n* *SR* vuln*r**ility *u* to missin* `POST` *n*or**m*nt. In `J*nkins` plu*ins, *orm `v*li**tion` m*t*o*s typi**lly *ollow t** '*o[**tion]' n*m