9.4 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
54.2%
Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.
rhn.redhat.com/errata/RHSA-2016-0489.html
access.redhat.com/errata/RHSA-2016:0070
wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11