Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-0791

Опубликовано: 07 апр. 2016
Источник: debian
EPSS Низкий

Описание

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jenkinsremovedpackage

Примечания

  • https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24

EPSS

Процентиль: 64%
0.00469
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

redhat
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

CVSS3: 9.8
nvd
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

CVSS3: 9.8
github
больше 3 лет назад

Exposure of Sensitive Information in Jenkins Core

EPSS

Процентиль: 64%
0.00469
Низкий