First published: Wed Sep 25 2019(Updated: )
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=2.176.3 | |
Jenkins Jenkins | <=2.196 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.177<=2.196 | 2.197 |
maven/org.jenkins-ci.main:jenkins-core | <=2.176.3 | 2.176.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.