Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2019/08/28/4 | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2789 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:3144 | Third Party Advisory |
https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jenkins
Published: 2019-08-28T15:30:17
Updated: 2023-10-24T16:48:34.717Z
Reserved: 2019-03-29T00:00:00
Link: CVE-2019-10384
JSON object: View
NVD Information
Status : Modified
Published: 2019-08-28T16:15:10.983
Modified: 2023-10-25T18:16:19.840
Link: CVE-2019-10384
JSON object: View
Redhat Information
No data.
CWE