CSRF tokens in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier did not expire, thereby allowing attackers able to obtain them to bypass CSRF protection.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2019/07/17/2 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/109373 - | |
References | () https://access.redhat.com/errata/RHSA-2019:2503 - | |
References | () https://access.redhat.com/errata/RHSA-2019:2548 - | |
References | () https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626 - Vendor Advisory |
Information
Published : 2019-07-17 16:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10353
Mitre link : CVE-2019-10353
CVE.ORG link : CVE-2019-10353
JSON object : View
Products Affected
jenkins
- jenkins
CWE
CWE-352
Cross-Site Request Forgery (CSRF)