CVE-2023-50766:
Jenkins Nexus Platform Plugin Cross-Site Request Forgery vulnerability
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.21462%
CWE
Published
12/13/2023
Updated
12/18/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.sonatype.nexus.ci:nexus-jenkins-plugin | maven | < 3.18.1-01 | 3.18.1-01 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from form validation methods that: 1) Did not require POST requests (CSRF vector), 2) Lacked Jenkins.ADMINISTER
permission checks (allowing Overall/Read users to trigger actions), and 3) Processed
external XML responses without XXE protection. The commit diff explicitly shows these methods were modified by adding @POST
annotations and permission checks, confirming their pre-patch vulnerable state. The affected methods handle HTTP
endpoints for configuration
validation and credential
verification, which when unprotected, allowed attackers to trigger malicious XML parsing and credential
leaks via CSRF.