First published: Thu Feb 25 2016(Updated: )
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.650 | 1.650 |
redhat/Jenkins | <1.642.2 | 1.642.2 |
Redhat Openshift | =3.1 | |
Jenkins Jenkins | <=1.649 | |
Jenkins Jenkins | =1.642.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.