Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-10405Cross-site Scripting in Jenkins

Severity
5.4MEDIUMNVD
EPSS
79.8%
top 0.90%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 25
Latest updateMay 24

Description

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.5

Affected Packages2 packages

NVDjenkins/jenkins2.176.3+1
CVEListV5jenkins_project/jenkins2.196 and earlier, LTS 2.176.3 and earlier

🔴Vulnerability Details

3
GHSA
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins2022-05-24
OSV
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins2022-05-24
CVEList
CVE-2019-10405: Jenkins 22019-09-25

💥Exploits & PoCs

1
Nuclei
Jenkins <=2.196 - Cookie Exposure

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2019-09-252019-09-25
Red Hat
jenkins: Diagnostic web page exposed Cookie HTTP header2019-09-25

💬Community

2
Bugzilla
CVE-2019-10401 CVE-2019-10402 CVE-2019-10403 CVE-2019-10404 CVE-2019-10405 CVE-2019-10406 jenkins: various flaws [fedora-all]2019-10-23
Bugzilla
CVE-2019-10405 jenkins: Diagnostic web page exposed Cookie HTTP header2019-10-22
CVE-2019-10405 — Cross-site Scripting in Jenkins | cvebase