Description

Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.

Remediation

References

Related Vulnerabilities

Severity

Critical

Classification

CWE-352

Tags

Vendor Advisory