Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-33002

Опубликовано: 18 мар. 2026
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

A flaw was found in Jenkins. A remote attacker could exploit a vulnerability in the origin validation of requests made through the Command Line Interface (CLI) WebSocket endpoint. By manipulating the Host or X-Forwarded-Host HTTP headers, an attacker can perform Domain Name System (DNS) rebinding attacks. This allows bypassing the origin validation, potentially leading to unauthorized actions within the Jenkins environment.

Отчет

This vulnerability is rated as Moderate by Red Hat, as the possible impacts of successful exploitation are tied to the permissions assigned to the anonymous user.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and ServicesjenkinsOut of support scope
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-346
https://bugzilla.redhat.com/show_bug.cgi?id=2448643jenkins: Jenkins: Origin validation bypass via DNS rebinding in CLI WebSocket endpoint

EPSS

Процентиль: 15%
0.00047
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
9 дней назад

Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation.

CVSS3: 7.5
github
9 дней назад

Jenkins has a DNS rebinding vulnerability in WebSocket CLI origin validation

EPSS

Процентиль: 15%
0.00047
Низкий

5.9 Medium

CVSS3