QID 730357
Date Published: 2022-02-15
QID 730357: Jenkins Core Cross-Site Request Forgery (CSRF) Vulnerability (Jenkins Security Advisory 2022-01-12)
Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.
Affected Versions does not require POST requests for the HTTP endpoint handling manual build requests when no security realm is set
Affected Versions:
Jenkins weekly up to and including 2.329
Jenkins LTS up to and including LTS 2.319.1
Fixed Versions:
Jenkins weekly should be updated to version 2.330
Jenkins LTS should be updated to version 2.319.2
QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version by sending a crafted GET request to Jenkins. This QID also detects the vulnerable version from login page or HTTP header.
A successful exploit could be resulting in a cross-site request forgery (CSRF) vulnerability.
For further details refer to Jenkins Security Advisory 2022-01-12
- Jenkins Security Advisory 2022-01-12 -
www.jenkins.io/security/advisory/2022-01-12/
CVEs related to QID 730357
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Jenkins Security Advisory 2022-01-12 |
|