First published: Tue Jan 22 2019(Updated: )
An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/TokenBasedRememberMeServices2.java that allows attackers with Overall/RunScripts permission to craft Remember Me cookies that would never expire, allowing e.g. to persist access to temporarily compromised user accounts.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.151<2.159 | 2.159 |
maven/org.jenkins-ci.main:jenkins-core | <2.150.2 | 2.150.2 |
Jenkins Jenkins | <=2.150.1 | |
Jenkins Jenkins | <=2.158 | |
Red Hat OpenShift Container Platform | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003003 is classified as a medium severity vulnerability due to the potential for unauthorized access through crafted Remember Me cookies.
To remediate CVE-2019-1003003, update Jenkins to version 2.159 or later, or 2.150.2 if using an earlier LTS version.
CVE-2019-1003003 affects Jenkins versions 2.158 and earlier, as well as LTS 2.150.1 and earlier.
CVE-2019-1003003 allows attackers with Overall/RunScripts permission to create Remember Me cookies that do not expire, granting them persistent access.
Yes, CVE-2019-1003003 is applicable to the Red Hat OpenShift Container Platform version 3.11.