Learn about CVE-2019-10384, a vulnerability in Jenkins versions 2.191 and earlier, LTS 2.176.2 and earlier, allowing CSRF token acquisition without a web session ID, potentially enabling CSRF protection bypass.
Jenkins 2.191 and earlier, as well as LTS 2.176.2 and earlier, had a vulnerability that allowed users to acquire CSRF tokens without a web session ID, leading to the creation of CSRF tokens without expiry.
Understanding CVE-2019-10384
Users could obtain CSRF tokens in Jenkins versions 2.191 and earlier, as well as LTS versions 2.176.2 and earlier, without needing a web session ID, enabling the bypass of CSRF protection for anonymous users.
What is CVE-2019-10384?
This CVE refers to a security flaw in Jenkins that allowed the acquisition of CSRF tokens without an associated web session ID, resulting in the creation of CSRF tokens that did not expire.
The Impact of CVE-2019-10384
The vulnerability enabled the circumvention of CSRF protection for anonymous users, potentially leading to unauthorized actions being performed in Jenkins instances.
Technical Details of CVE-2019-10384
Jenkins versions 2.191 and earlier, as well as LTS versions 2.176.2 and earlier, were affected by this vulnerability.
Vulnerability Description
Users could obtain CSRF tokens without a web session ID, resulting in the creation of CSRF tokens that did not have an expiry, allowing the bypass of CSRF protection for anonymous users.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability allowed users to acquire CSRF tokens without the necessary web session ID, enabling the creation of CSRF tokens that did not expire, thus bypassing CSRF protection for anonymous users.
Mitigation and Prevention
Immediate Steps to Take:
Patching and Updates
Ensure that Jenkins is regularly updated to the latest secure version to mitigate the vulnerability.