Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10405

Опубликовано: 25 сент. 2019
Источник: redhat
CVSS3: 4.4

Описание

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10jenkinsOut of support scope
Red Hat OpenShift Container Platform 3.9jenkinsOut of support scope
Red Hat OpenShift Container Platform 3.11jenkinsFixedRHBA-2020:001714.01.2020
Red Hat OpenShift Container Platform 4.3jenkinsFixedRHBA-2020:006323.01.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1764369jenkins: Diagnostic web page exposed Cookie HTTP header

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
nvd
больше 6 лет назад

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

CVSS3: 5.4
debian
больше 6 лет назад

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value o ...

CVSS3: 4.3
github
больше 3 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in Jenkins

4.4 Medium

CVSS3