Miggo Logo

CVE-2023-50767: Jenkins Nexus Platform Plugin missing permission check

7.1

CVSS Score
3.1

Basic Information

EPSS Score
0.33591%
Published
12/13/2023
Updated
12/18/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.sonatype.nexus.ci:nexus-jenkins-pluginmaven< 3.18.1-013.18.1-01

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows these methods were modified to add @POST annotations and Jenkins.ADMINISTER permission checks. The vulnerability description explicitly states that form validation methods lacked authorization checks and CSRF protection. Each identified function: 1) Implements form validation 2) Was missing required permission checks in vulnerable versions 3) Allowed GET requests (fixed by adding @POST). The XXE vulnerability stems from XML parsing in these endpoints without proper parser configuration, which was fixed by updating the nexus-platform-api dependency in pom.xml.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins N*xus Pl*t*orm Plu*in *.**.*-** *n* **rli*r *o*s not p*r*orm p*rmission ****ks in m*t*o*s impl*m*ntin* *orm v*li**tion. T*is *llows *tt**k*rs wit* Ov*r*ll/R*** p*rmission to s*n* *n *TTP r*qu*st to *n *tt**k*r-sp**i*i** URL *n* p*rs* t** r*s

Reasoning

T** *ommit *i** s*ows t**s* m*t*o*s w*r* mo*i*i** to *** @POST *nnot*tions *n* J*nkins.**MINIST*R p*rmission ****ks. T** vuln*r**ility **s*ription *xpli*itly st*t*s t**t *orm v*li**tion m*t*o*s l**k** *ut*oriz*tion ****ks *n* *SR* prot**tion. **** i*
CVE-2023-50767: Nexus Platform Form Valid XXE | Miggo