First published: Tue Jan 22 2019(Updated: )
An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java that allows attackers to extend the duration of active HTTP sessions indefinitely even though the user account may have been deleted in the mean time.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=2.150.1 | |
Jenkins Jenkins | <=2.159 | |
Red Hat OpenShift Container Platform | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003004 is classified as a medium severity vulnerability due to improper authorization allowing session duration extension.
To fix CVE-2019-1003004, upgrade Jenkins to version 2.160 or later, or LTS version 2.150.2 or later.
Jenkins versions 2.158 and earlier, as well as LTS version 2.150.1 and earlier, are affected by CVE-2019-1003004.
Yes, Red Hat OpenShift Container Platform version 3.11 is also affected by CVE-2019-1003004.
CVE-2019-1003004 allows attackers to extend the duration of active HTTP sessions indefinitely, which can lead to unauthorized access.