Description
Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5344 | Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user. |
Github GHSA |
GHSA-vcr8-h8qp-qj8h | Cross-Site Request Forgery in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T22:17:20.571Z
Reserved: 2019-03-29T00:00:00.000Z
Link: CVE-2019-10384
No data.
Status : Modified
Published: 2019-08-28T16:15:10.983
Modified: 2024-11-21T04:19:01.147
Link: CVE-2019-10384
OpenCVE Enrichment
No data.
EUVD
Github GHSA