Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2020/03/25/2 | Mailing List Third Party Advisory |
https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1774 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2020/03/25/2 | Mailing List Third Party Advisory |
https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1774 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2020/03/25/2 - Mailing List, Third Party Advisory | |
References | () https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1774 - Vendor Advisory |
Information
Published : 2020-03-25 17:15
Updated : 2024-11-21 05:24
NVD link : CVE-2020-2160
Mitre link : CVE-2020-2160
CVE.ORG link : CVE-2020-2160
JSON object : View
Products Affected
jenkins
- jenkins
CWE
CWE-352
Cross-Site Request Forgery (CSRF)