Description
Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.
Remediation
References
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11
https://access.redhat.com/errata/RHSA-2016:0070
http://rhn.redhat.com/errata/RHSA-2016-0489.html
Related Vulnerabilities
CVE-2019-10451 Vulnerability in maven package com.soasta.jenkins:cloudtest
CVE-2019-10077 Vulnerability in maven package org.apache.jspwiki:jspwiki-main
CVE-2019-3772 Vulnerability in maven package org.springframework.integration:spring-integration-xml
CVE-2022-33682 Vulnerability in maven package org.apache.pulsar:pulsar-broker
CVE-2016-3081 Vulnerability in maven package org.apache.struts:struts2-core