https://bugzilla.redhat.com/show_bug.cgi?id=1747297
Bug ID: 1747297
Summary: CVE-2019-10384 jenkins: CSRF protection tokens for
anonymous users did not expire in some circumstances
(SECURITY-1491)
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: darunesh(a)redhat.com
CC: abenaiss(a)redhat.com, adam.kaplan(a)redhat.com,
ahardin(a)redhat.com, aos-bugs(a)redhat.com,
bleanhar(a)redhat.com, ccoleman(a)redhat.com,
dedgar(a)redhat.com, eparis(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
jgoulding(a)redhat.com, jokerman(a)redhat.com,
mchappel(a)redhat.com, mizdebsk(a)redhat.com,
msrb(a)redhat.com, vbobade(a)redhat.com, wzheng(a)redhat.com
Target Milestone: ---
Classification: Other
Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF
tokens without an associated web session ID, resulting in CSRF tokens that did
not expire and could be used to bypass CSRF protection for the anonymous user.
Reference:
http://www.openwall.com/lists/oss-security/2019/08/28/4
--
You are receiving this mail because:
You are on the CC list for the bug.