CVE-2023-50767: Jenkins Nexus Platform Plugin missing permission check
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.33591%
CWE
Published
12/13/2023
Updated
12/18/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.sonatype.nexus.ci:nexus-jenkins-plugin | maven | < 3.18.1-01 | 3.18.1-01 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows these methods were modified to add @POST annotations and Jenkins.ADMINISTER permission checks. The vulnerability description explicitly states that form validation methods lacked authorization checks and CSRF protection. Each identified function: 1) Implements form validation 2) Was missing required permission checks in vulnerable versions 3) Allowed GET requests (fixed by adding @POST). The XXE vulnerability stems from XML parsing in these endpoints without proper parser configuration, which was fixed by updating the nexus-platform-api dependency in pom.xml.