Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-47wc-p5cp-w7pw

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Exposure of Sensitive Information to an Unauthorized Actor in Jenkins

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

Пакеты

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

<= 2.176.3

2.176.4

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

>= 2.177, <= 2.196

2.197

EPSS

Процентиль: 99%
0.81459
Высокий

4.3 Medium

CVSS3

Дефекты

CWE-200
CWE-79

Связанные уязвимости

CVSS3: 4.4
redhat
больше 6 лет назад

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

CVSS3: 5.4
nvd
больше 6 лет назад

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

CVSS3: 5.4
debian
больше 6 лет назад

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value o ...

EPSS

Процентиль: 99%
0.81459
Высокий

4.3 Medium

CVSS3

Дефекты

CWE-200
CWE-79