Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-2613

Опубликовано: 15 мая 2018
Источник: nvd
CVSS3: 5.4
CVSS2: 5.8
EPSS Низкий

Описание

jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation CSRF using GET by admins. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records (SECURITY-406).

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
Версия до 2.32.2 (исключая)
cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
Версия до 2.44 (исключая)

EPSS

Процентиль: 19%
0.0006
Низкий

5.4 Medium

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-770
CWE-352

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 7 лет назад

jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation CSRF using GET by admins. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records (SECURITY-406). Accessing these URLs now no longer results in a user record getting created, Jenkins will respond with 404 Not Found if no such user exists. When using the internal Jenkins user database, new users can be created via Manage Jenkins » Manage Users.

CVSS3: 5.4
redhat
около 9 лет назад

jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation CSRF using GET by admins. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records (SECURITY-406).

CVSS3: 5.4
debian
больше 7 лет назад

jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation ...

CVSS3: 5.4
github
больше 3 лет назад

Cross-Site Request Forgery in Jenkins

EPSS

Процентиль: 19%
0.0006
Низкий

5.4 Medium

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-770
CWE-352