First published: Mon Nov 16 2015(Updated: )
Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.638 | 1.638 |
redhat/Jenkins | <1.625.2 | 1.625.2 |
Jenkins Jenkins | <=1.637 | |
redhat openshift | <=3.1 | |
redhat openshift | =2.0 | |
Jenkins Jenkins | <=1.625.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5318 is considered a moderate severity vulnerability due to the potential for bypassing CSRF protections.
To fix CVE-2015-5318, update Jenkins to version 1.638 or later, or LTS to version 1.625.2 or later.
CVE-2015-5318 affects Jenkins versions prior to 1.638 and LTS versions prior to 1.625.2.
CVE-2015-5318 can be exploited via a brute force attack to bypass the CSRF protection mechanism.
CVE-2015-5318 relates to the use of a publicly accessible salt for generating CSRF protection tokens.