- Description
- Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation.
- Source
- jenkinsci-cert@googlegroups.com
- NVD status
- Analyzed
- Products
- jenkins
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 5.9
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-350
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"matchCriteriaId": "B3638046-C2A7-4BEF-95E1-6E5C493DAA39",
"versionEndExcluding": "2.541.3",
"versionStartIncluding": "2.426.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"matchCriteriaId": "7C72BD61-34BC-4609-9019-4C342792D538",
"versionEndExcluding": "2.555",
"versionStartIncluding": "2.442",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]