CSRF tokens in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier did not expire, thereby allowing attackers able to obtain them to bypass CSRF protection.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2019/07/17/2 | third party advisory mailing list |
http://www.securityfocus.com/bid/109373 | vdb entry |
https://access.redhat.com/errata/RHSA-2019:2503 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2548 | vendor advisory |
https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626 | vendor advisory |