CVE-2016-0791

Published on: 04/07/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:13 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Jenkins from Jenkins contain the following vulnerability:

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

  • CVE-2016-0791 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:1773
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2016:0711
Jenkins Security Advisory 2016-02-24 - Security Advisories - Jenkins Wiki Patch
Vendor Advisory
wiki.jenkins-ci.org
text/html
URL Logo CONFIRM wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationJenkinsJenkins1.642.1AllAllAll
ApplicationJenkinsJenkins1.642.1AllAllAll
ApplicationJenkinsJenkinsAllAllAllAll
ApplicationRedhatOpenshift3.1AllAllAll
ApplicationRedhatOpenshift3.1AllAllAll
  • cpe:2.3:a:jenkins:jenkins:1.642.1:*:*:*:lts:*:*:*:
  • cpe:2.3:a:jenkins:jenkins:1.642.1:*:*:*:lts:*:*:*:
  • cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*:
  • cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*: