Description
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-47wc-p5cp-w7pw | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T22:24:16.961Z
Reserved: 2019-03-29T00:00:00.000Z
Link: CVE-2019-10405
No data.
Status : Modified
Published: 2019-09-25T16:15:10.697
Modified: 2024-11-21T04:19:03.917
Link: CVE-2019-10405
OpenCVE Enrichment
No data.
Github GHSA