Miggo Logo

CVE-2024-28158: Jenkins Subversion Partial Release Manager Plugin vulnerable to Cross-Site Request Forgery

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.1894%
Published
3/6/2024
Updated
5/2/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:svn-partial-release-mgrmaven<= 1.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly states two key vulnerabilities in the HTTP endpoint: 1) Missing permission check (CVE-2024-28159) allowing Item/Read users to trigger builds, and 2) CSRF vulnerability (CVE-2024-28158) due to accepting GET requests. In Jenkins plugin architecture, HTTP endpoints handling build triggers typically use methods named like doBuildTrigger in Action classes. The combination of missing @RequirePOST annotation and lack of permission validation in this handler would make it vulnerable. While exact implementation details aren't available, this pattern matches Jenkins' vulnerability patterns for CSRF and matches the described attack vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-sit* r*qu*st *or**ry (*SR*) vuln*r**ility in J*nkins Su*v*rsion P*rti*l R*l**s* M*n***r Plu*in *.*.* *n* **rli*r *llows *tt**k*rs to tri***r * *uil*.

Reasoning

T** **visory *xpli*itly st*t*s two k*y vuln*r**iliti*s in t** `*TTP` *n*point: *) Missin* p*rmission ****k (*V*-****-*****) *llowin* `It*m/R***` us*rs to tri***r *uil*s, *n* *) *SR* vuln*r**ility (*V*-****-*****) *u* to ****ptin* `**T` r*qu*sts. In `