Описание
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenShift Container Platform 3.10 | jenkins | Out of support scope | ||
| Red Hat OpenShift Container Platform 3.9 | jenkins | Out of support scope | ||
| Red Hat OpenShift Container Platform 3.11 | jenkins | Fixed | RHBA-2020:0017 | 14.01.2020 |
| Red Hat OpenShift Container Platform 4.3 | jenkins | Fixed | RHBA-2020:0063 | 23.01.2020 |
Показывать по
10
Дополнительная информация
Статус:
Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1764369jenkins: Diagnostic web page exposed Cookie HTTP header
4.4 Medium
CVSS3
Связанные уязвимости
CVSS3: 5.4
nvd
больше 6 лет назад
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
CVSS3: 5.4
debian
больше 6 лет назад
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value o ...
CVSS3: 4.3
github
больше 3 лет назад
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
4.4 Medium
CVSS3