CVE-2022-27204

8.8 HIGH

📋 TL;DR

A cross-site request forgery (CSRF) vulnerability in Jenkins Extended Choice Parameter Plugin allows attackers to trick authenticated users into making unintended requests to attacker-controlled URLs. This affects Jenkins installations using the vulnerable plugin version, potentially leading to unauthorized actions being performed with the victim's privileges.

💻 Affected Systems

Products:
  • Jenkins Extended Choice Parameter Plugin
Versions: 346.vd87693c5a_86c and earlier
Operating Systems: All platforms running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the vulnerable plugin to be installed and enabled in Jenkins.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary Jenkins operations with the victim's permissions, potentially leading to remote code execution, data exfiltration, or complete system compromise.

🟠

Likely Case

Attackers could manipulate Jenkins jobs, steal credentials, or perform unauthorized administrative actions by tricking authenticated users.

🟢

If Mitigated

With proper CSRF protections and network segmentation, impact is limited to the specific Jenkins instance and plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user into visiting a malicious page while logged into Jenkins.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 347.vd8b_35a_040b_42 or later

Vendor Advisory: https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1350

Restart Required: Yes

Instructions:

1. Update Jenkins Extended Choice Parameter Plugin to version 347.vd8b_35a_040b_42 or later via Jenkins Plugin Manager. 2. Restart Jenkins to apply the update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the Extended Choice Parameter Plugin if immediate patching is not possible.

Navigate to Jenkins > Manage Jenkins > Manage Plugins > Installed tab > Find 'Extended Choice Parameter' > Click 'Disable'

🧯 If You Can't Patch

  • Implement strict network access controls to limit Jenkins access to trusted users only
  • Enable CSRF protection in Jenkins global security settings and use anti-CSRF tokens

🔍 How to Verify

Check if Vulnerable:

Check Jenkins plugin manager for Extended Choice Parameter Plugin version. If version is 346.vd87693c5a_86c or earlier, system is vulnerable.

Check Version:

Check via Jenkins web UI: Manage Jenkins > Manage Plugins > Installed tab > Find 'Extended Choice Parameter'

Verify Fix Applied:

Verify plugin version is 347.vd8b_35a_040b_42 or later in Jenkins Plugin Manager.

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin-related errors in Jenkins logs
  • Unexpected requests to external URLs from Jenkins

Network Indicators:

  • Outbound connections from Jenkins to unexpected external domains
  • CSRF token validation failures

SIEM Query:

source="jenkins.log" AND ("Extended Choice Parameter" OR "CSRF" OR "forgery")

🔗 References

📤 Share & Export