Loading HuntDB...

CVE-2019-10405

UNKNOWN
Published 2019-09-25T15:05:32
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2019-10405. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

Available Exploits

Jenkins <=2.196 - Cookie Exposure

Jenkins through 2.196, LTS 2.176.3 and earlier prints the value of the cookie on the /whoAmI/ URL despite it being marked HttpOnly, thus making it possible to steal cookie-based authentication credentials if the URL is exposed or accessed via another cross-site scripting issue.

ID: CVE-2019-10405
Author: c-sh0 Medium

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed MODERATE

Exposure of Sensitive Information to an Unauthorized Actor in Jenkins

GHSA-47wc-p5cp-w7pw

Advisory Details

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

Affected Packages

Maven org.jenkins-ci.main:jenkins-core
ECOSYSTEM: ≥0 <2.176.4
Maven org.jenkins-ci.main:jenkins-core
ECOSYSTEM: ≥2.177 <2.197

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: June 28, 2022

References

Published: 2019-09-25T15:05:32
Last Modified: 2024-08-04T22:24:16.961Z
Copied to clipboard!