Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-27625

Опубликовано: 05 мар. 2025
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (\) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects.

A flaw was found in jenkins. Affected versions of Jenkins, redirects starting with backslash (\) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and ServicesjenkinsFix deferred
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=2350210jenkins: Open redirect vulnerability

EPSS

Процентиль: 25%
0.00085
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
около 1 года назад

In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (`\`) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects.

CVSS3: 4.3
github
около 1 года назад

Jenkins Open Redirect vulnerability

CVSS3: 4.3
fstec
около 1 года назад

Уязвимость сервера автоматизации Jenkins, связанная с переадресацией URL на ненадежный сайт, позволяющая нарушителю перенаправлять пользователей на произвольный URL-адрес

CVSS3: 5.4
redos
12 месяцев назад

Множественные уязвимости jenkins

EPSS

Процентиль: 25%
0.00085
Низкий

4.3 Medium

CVSS3