Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-5344 | Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user. |
![]() |
GHSA-vcr8-h8qp-qj8h | Cross-Site Request Forgery in Jenkins |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T22:17:20.571Z
Reserved: 2019-03-29T00:00:00
Link: CVE-2019-10384

No data.

Status : Modified
Published: 2019-08-28T16:15:10.983
Modified: 2024-11-21T04:19:01.147
Link: CVE-2019-10384


No data.