Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7xp8-7wqx-5hqx

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 3.1

Описание

Jenkins REST APIs vulnerable to clickjacking

Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not serve the X-Frame-Options: deny HTTP header on REST API responses to protect against clickjacking attacks. An attacker could exploit this by routing the victim through a specially crafted web page that embeds a REST API endpoint in an iframe and tricking the user into performing an action which would allow for the attacker to learn the content of that REST API endpoint.

Jenkins 2.219, LTS 2.204.2 now adds the X-Frame-Options: deny HTTP header to REST API responses, which prevents these types of clickjacking attacks.

Пакеты

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

<= 2.204.1

2.204.2

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

>= 2.205, <= 2.218

2.219

EPSS

Процентиль: 38%
0.00167
Низкий

3.1 Low

CVSS3

Дефекты

CWE-1021

Связанные уязвимости

CVSS3: 3.1
redhat
около 6 лет назад

REST API endpoints in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier were vulnerable to clickjacking attacks.

CVSS3: 5.4
nvd
около 6 лет назад

REST API endpoints in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier were vulnerable to clickjacking attacks.

CVSS3: 5.4
debian
около 6 лет назад

REST API endpoints in Jenkins 2.218 and earlier, LTS 2.204.1 and earli ...

EPSS

Процентиль: 38%
0.00167
Низкий

3.1 Low

CVSS3

Дефекты

CWE-1021