Description
Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5344 | Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user. |
Github GHSA |
GHSA-vcr8-h8qp-qj8h | Cross-Site Request Forgery in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T22:17:20.571Z
Reserved: 2019-03-29T00:00:00.000Z
Link: CVE-2019-10384
No data.
Status : Modified
Published: 2019-08-28T16:15:10.983
Modified: 2024-11-21T04:19:01.147
Link: CVE-2019-10384
OpenCVE Enrichment
No data.
EUVD
Github GHSA