Miggo Logo

CVE-2023-49673:
Jenkins NeuVector Vulnerability Scanner Plugin Cross-Site Request Forgery vulnerability

4.3

CVSS Score

Basic Information

EPSS Score
-
Published
11/29/2023
Updated
8/2/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
io.jenkins.plugins:neuvector-vulnerability-scannermaven< 2.22.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability describes an HTTP endpoint for connection testing that lacked both permission checks (requiring only Overall/Read instead of Overall/Administer) and CSRF protection (allowing non-POST requests). In Jenkins plugin architecture, form validation and connection test endpoints are typically implemented as do* methods in a DescriptorImpl class. The combination of missing permission enforcement (via checkPermission() calls) and lack of HTTP method restriction aligns with the described vulnerability. The high confidence comes from the direct mapping of the vulnerability characteristics to standard Jenkins plugin patterns for HTTP endpoint handling.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins N*uV**tor Vuln*r**ility S**nn*r Plu*in *.** *n* **rli*r *o*s not p*r*orm * p*rmission ****k in * *onn**tion t*st *TTP *n*point. T*is *llows *tt**k*rs wit* Ov*r*ll/R*** p*rmission to *onn**t to *n *tt**k*r-sp**i*i** *ostn*m* *n* port usin* *tt

Reasoning

T** vuln*r**ility **s*ri**s *n *TTP *n*point *or *onn**tion t*stin* t**t l**k** *ot* p*rmission ****ks (r*quirin* only Ov*r*ll/R*** inst*** o* Ov*r*ll/**minist*r) *n* *SR* prot**tion (*llowin* non-POST r*qu*sts). In J*nkins plu*in *r**it**tur*, *orm