Note:
This project will be discontinued after December 13, 2021. [more]
2019-09-25
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
Products | Jenkins |
Type | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79) |
First patch | - None (likely due to unavailable code) |
Links |
• https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1505
• http://www.openwall.com/lists/oss-security/2019/09/25/3 |