Miggo Logo

CVE-2025-24398: Bitbucket Server Integration Plugin allows bypassing CSRF protection for any URL

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.3965%
Published
1/22/2025
Updated
1/22/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
io.jenkins.plugins:atlassian-bitbucket-server-integrationmaven>= 2.1.0, < 4.1.44.1.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the plugin's implementation of Jenkins' CrumbExclusion extension point for OAuth 1.0 authentication. The advisory indicates the exclusion logic was too broad in vulnerable versions (2.1.0-4.1.3). The standard Jenkins CSRF protection mechanism uses CrumbExclusion implementations to whitelist specific URLs. The vulnerable function likely used insufficiently restrictive pattern matching in its exclude() method, potentially matching any URL containing a crafted pattern rather than strictly limiting to required OAuth endpoints. The patch in 4.1.4 would have tightened the URL validation logic in this exclusion handler.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n *xt*nsion point in J*nkins *llows s*l**tiv*ly *is**lin* *ross-sit* r*qu*st *or**ry (*SR*) prot**tion *or sp**i*i* URLs. *it*u*k*t S*rv*r Int**r*tion Plu*in impl*m*nts t*is *xt*nsion point to support O*ut* *.* *ut**nti**tion. In *it*u*k*t S*rv*r I

Reasoning

T** vuln*r**ility st*ms *rom t** plu*in's impl*m*nt*tion o* J*nkins' *rum**x*lusion *xt*nsion point *or O*ut* *.* *ut**nti**tion. T** **visory in*i**t*s t** *x*lusion lo*i* w*s too *ro** in vuln*r**l* v*rsions (*.*.*-*.*.*). T** st*n**r* J*nkins *SR*