Miggo Logo

CVE-2023-50766:
Jenkins Nexus Platform Plugin Cross-Site Request Forgery vulnerability

7.1

CVSS Score
3.1

Basic Information

EPSS Score
0.21462%
Published
12/13/2023
Updated
12/18/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.sonatype.nexus.ci:nexus-jenkins-pluginmaven< 3.18.1-013.18.1-01

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from form validation methods that: 1) Did not require POST requests (CSRF vector), 2) Lacked Jenkins.ADMINISTER permission checks (allowing Overall/Read users to trigger actions), and 3) Processed external XML responses without XXE protection. The commit diff explicitly shows these methods were modified by adding @POST annotations and permission checks, confirming their pre-patch vulnerable state. The affected methods handle HTTP endpoints for configuration validation and credential verification, which when unprotected, allowed attackers to trigger malicious XML parsing and credential leaks via CSRF.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins N*xus Pl*t*orm Plu*in *.**.*-** *n* **rli*r *o*s not p*r*orm p*rmission ****ks in m*t*o*s impl*m*ntin* *orm v*li**tion. T*is *llows *tt**k*rs wit* Ov*r*ll/R*** p*rmission to s*n* *n *TTP r*qu*st to *n *tt**k*r-sp**i*i** URL *n* p*rs* t** r*s

Reasoning

T** vuln*r**ility st*ms *rom *orm v*li**tion m*t*o*s t**t: *) *i* not r*quir* POST r*qu*sts (*SR* v**tor), *) L**k** `J*nkins.**MINIST*R` p*rmission ****ks (*llowin* Ov*r*ll/R*** us*rs to tri***r **tions), *n* *) `Pro**ss**` *xt*rn*l XML r*spons*s wi