← Back to CVEs
CVE-2015-5318
N/ADescription
Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.
CVE Details
CVSS v3.1 ScoreN/A
Published11/25/2015
Last Modified4/12/2025
Sourcenvd
Honeypot Sightings0
Affected Products
jenkins:jenkinsredhat:openshift
Weaknesses (CWE)
CWE-352
References
http://rhn.redhat.com/errata/RHSA-2016-0489.html(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2016:0070(secalert@redhat.com)
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2016-0489.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2016:0070(af854a3a-2127-422b-91ae-364da2661108)
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.