Loading HuntDB...

GHSA-47wc-p5cp-w7pw

GitHub Security Advisory

Exposure of Sensitive Information to an Unauthorized Actor in Jenkins

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

Affected Packages

Maven org.jenkins-ci.main:jenkins-core
Affected versions: 0 (fixed in 2.176.4)
Maven org.jenkins-ci.main:jenkins-core
Affected versions: 2.177 (fixed in 2.197)

Related CVEs

Key Information

GHSA ID
GHSA-47wc-p5cp-w7pw
Published
May 24, 2022 10:00 PM
Last Modified
June 28, 2022 4:17 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.main:jenkins-core
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.