Логотип exploitDog
bind:CVE-2026-33002
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-33002

Количество 3

Количество 3

redhat логотип

CVE-2026-33002

9 дней назад

A flaw was found in Jenkins. A remote attacker could exploit a vulnerability in the origin validation of requests made through the Command Line Interface (CLI) WebSocket endpoint. By manipulating the Host or X-Forwarded-Host HTTP headers, an attacker can perform Domain Name System (DNS) rebinding attacks. This allows bypassing the origin validation, potentially leading to unauthorized actions within the Jenkins environment.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2026-33002

9 дней назад

Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-phhv-63fh-rrc8

9 дней назад

Jenkins has a DNS rebinding vulnerability in WebSocket CLI origin validation

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-33002

A flaw was found in Jenkins. A remote attacker could exploit a vulnerability in the origin validation of requests made through the Command Line Interface (CLI) WebSocket endpoint. By manipulating the Host or X-Forwarded-Host HTTP headers, an attacker can perform Domain Name System (DNS) rebinding attacks. This allows bypassing the origin validation, potentially leading to unauthorized actions within the Jenkins environment.

CVSS3: 5.9
0%
Низкий
9 дней назад
nvd логотип
CVE-2026-33002

Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation.

CVSS3: 7.5
0%
Низкий
9 дней назад
github логотип
GHSA-phhv-63fh-rrc8

Jenkins has a DNS rebinding vulnerability in WebSocket CLI origin validation

CVSS3: 7.5
0%
Низкий
9 дней назад

Уязвимостей на страницу