Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jmw7-ph6p-33cc

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Exposure of Sensitive Information in Jenkins Core

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

Пакеты

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

< 1.650

1.650

EPSS

Процентиль: 64%
0.00469
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

redhat
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

CVSS3: 9.8
nvd
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

CVSS3: 9.8
debian
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time ...

EPSS

Процентиль: 64%
0.00469
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-200