Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10405

Опубликовано: 25 сент. 2019
Источник: debian
EPSS Высокий

Описание

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jenkinsremovedpackage

EPSS

Процентиль: 99%
0.81459
Высокий

Связанные уязвимости

CVSS3: 4.4
redhat
больше 6 лет назад

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

CVSS3: 5.4
nvd
больше 6 лет назад

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

CVSS3: 4.3
github
больше 3 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in Jenkins

EPSS

Процентиль: 99%
0.81459
Высокий