CVE-2022-34203

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in Jenkins EasyQA Plugin allows attackers to trick authenticated users into making unintended requests to attacker-controlled HTTP servers. Attackers could potentially connect Jenkins to malicious servers, leading to data exfiltration or further attacks. All Jenkins instances with EasyQA Plugin 1.0 or earlier are affected.

💻 Affected Systems

Products:
  • Jenkins EasyQA Plugin
Versions: 1.0 and earlier
Operating Systems: All platforms running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the EasyQA Plugin to be installed and enabled. Jenkins must be accessible to attackers (directly or via user interaction).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could connect Jenkins to malicious servers, enabling data theft, credential harvesting, or using Jenkins as a pivot point for internal network attacks.

🟠

Likely Case

Attackers could redirect Jenkins to attacker-controlled servers, potentially stealing sensitive build data, credentials, or using the connection for further exploitation.

🟢

If Mitigated

With proper CSRF protections and network segmentation, impact is limited to potential connection attempts that fail due to security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user into visiting a malicious page. No authentication bypass is needed beyond the CSRF attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Jenkins EasyQA Plugin version 1.1 or later

Vendor Advisory: https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2281

Restart Required: Yes

Instructions:

1. Access Jenkins admin console. 2. Navigate to Manage Jenkins > Manage Plugins. 3. Go to Available tab. 4. Search for EasyQA Plugin. 5. Check for updates and install version 1.1 or later. 6. Restart Jenkins.

🔧 Temporary Workarounds

Disable EasyQA Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

Navigate to Manage Jenkins > Manage Plugins > Installed tab, find EasyQA Plugin, click Disable

Implement CSRF Protection

all

Enable and configure Jenkins CSRF protection

Navigate to Manage Jenkins > Configure Global Security, enable 'Prevent Cross Site Request Forgery exploits', configure Crumb Issuer

🧯 If You Can't Patch

  • Network segmentation: Restrict Jenkins server network access to only necessary internal systems
  • User awareness: Train users to avoid clicking suspicious links while authenticated to Jenkins

🔍 How to Verify

Check if Vulnerable:

Check Jenkins plugin manager for EasyQA Plugin version. If version is 1.0 or earlier, system is vulnerable.

Check Version:

curl -s http://jenkins-host/pluginManager/api/json?depth=1 | grep -o '"shortName":"easyqa","version":"[^"]*"'

Verify Fix Applied:

Verify EasyQA Plugin version is 1.1 or later in Manage Jenkins > Manage Plugins > Installed tab.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to EasyQA Plugin endpoints from unexpected sources
  • Failed connection attempts to unknown external servers

Network Indicators:

  • Outbound connections from Jenkins to unfamiliar HTTP servers on non-standard ports
  • Increased traffic to EasyQA Plugin endpoints

SIEM Query:

source="jenkins.log" AND ("EasyQA" OR "easyqa") AND (POST OR PUT) AND NOT (user_agent="Jenkins" OR referer="jenkins")

🔗 References

📤 Share & Export