Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.
2015-11-25T20:59:09.103
2025-04-12T10:46:40.837
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | jenkins | jenkins | ≤ 1.637 | Yes |
Application | redhat | openshift | ≤ 3.1 | Yes |
Application | redhat | openshift | 2.0 | Yes |
Application | jenkins | jenkins | ≤ 1.625.1 | Yes |