Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.
References
Configurations
History
No history.
Information
Published : 2015-11-25 20:59
Updated : 2024-02-28 15:21
NVD link : CVE-2015-5318
Mitre link : CVE-2015-5318
CVE.ORG link : CVE-2015-5318
JSON object : View
Products Affected
redhat
- openshift
jenkins
- jenkins
CWE
CWE-352
Cross-Site Request Forgery (CSRF)