First published: Mon Nov 16 2015(Updated: )
Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.638 | 1.638 |
redhat/Jenkins | <1.625.2 | 1.625.2 |
Jenkins Jenkins | <=1.637 | |
Redhat Openshift | <=3.1 | |
Redhat Openshift | =2.0 | |
Jenkins Jenkins | <=1.625.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.