Note:
This project will be discontinued after December 13, 2021. [more]
2019-08-28
Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.
Products | Jenkins, Communications_cloud_native_core_automated_test_suite, Openshift_container_platform |
Type | Cross-Site Request Forgery (CSRF) (CWE-352) |
First patch | - None (likely due to unavailable code) |
Links |
• https://access.redhat.com/errata/RHSA-2019:2789
• http://www.openwall.com/lists/oss-security/2019/08/28/4 • https://www.oracle.com/security-alerts/cpuapr2022.html • https://access.redhat.com/errata/RHSA-2019:3144 • https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491 |