CVE-2023-49673:
Jenkins NeuVector Vulnerability Scanner Plugin Cross-Site Request Forgery vulnerability
4.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
11/29/2023
Updated
8/2/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
io.jenkins.plugins:neuvector-vulnerability-scanner | maven | < 2.2 | 2.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability describes an HTTP endpoint for connection testing that lacked both permission checks (requiring only Overall/Read instead of Overall/Administer) and CSRF protection (allowing non-POST requests). In Jenkins plugin architecture, form validation and connection test endpoints are typically implemented as do* methods in a DescriptorImpl class. The combination of missing permission enforcement (via checkPermission() calls) and lack of HTTP method restriction aligns with the described vulnerability. The high confidence comes from the direct mapping of the vulnerability characteristics to standard Jenkins plugin patterns for HTTP endpoint handling.