Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5344 | Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user. |
Github GHSA |
GHSA-vcr8-h8qp-qj8h | Cross-Site Request Forgery in Jenkins |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T22:17:20.571Z
Reserved: 2019-03-29T00:00:00
Link: CVE-2019-10384
No data.
Status : Modified
Published: 2019-08-28T16:15:10.983
Modified: 2024-11-21T04:19:01.147
Link: CVE-2019-10384
OpenCVE Enrichment
No data.
EUVD
Github GHSA