Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5318

Опубликовано: 11 нояб. 2015
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=1282361jenkins: Public value used for CSRF protection salt (SECURITY-169)

EPSS

Процентиль: 18%
0.00058
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.

nvd
около 10 лет назад

Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.

debian
около 10 лет назад

Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible ...

github
больше 3 лет назад

Jenkins Vulnerable to Cross-Site Request Forgery (CSRF) Attack

EPSS

Процентиль: 18%
0.00058
Низкий

4.3 Medium

CVSS2