Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-0791

Опубликовано: 24 фев. 2016
Источник: redhat
CVSS2: 3.6

Описание

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1311949jenkins: Non-constant time comparison of CSRF crumbs (SECURITY-245)

3.6 Low

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

CVSS3: 9.8
nvd
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

CVSS3: 9.8
debian
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time ...

CVSS3: 9.8
github
больше 3 лет назад

Exposure of Sensitive Information in Jenkins Core

3.6 Low

CVSS2