Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-phhv-63fh-rrc8

Опубликовано: 18 мар. 2026
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Jenkins has a DNS rebinding vulnerability in WebSocket CLI origin validation

Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation.

Пакеты

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

>= 2.442, < 2.555

2.555

EPSS

Процентиль: 15%
0.00047
Низкий

7.5 High

CVSS3

Дефекты

CWE-346
CWE-350

Связанные уязвимости

CVSS3: 5.9
redhat
9 дней назад

A flaw was found in Jenkins. A remote attacker could exploit a vulnerability in the origin validation of requests made through the Command Line Interface (CLI) WebSocket endpoint. By manipulating the Host or X-Forwarded-Host HTTP headers, an attacker can perform Domain Name System (DNS) rebinding attacks. This allows bypassing the origin validation, potentially leading to unauthorized actions within the Jenkins environment.

CVSS3: 7.5
nvd
9 дней назад

Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation.

EPSS

Процентиль: 15%
0.00047
Низкий

7.5 High

CVSS3

Дефекты

CWE-346
CWE-350