Miggo Logo

CVE-2014-9635: Jenkins HttpOnly flag not Set for session cookies

5.3

CVSS Score
3.0

Basic Information

EPSS Score
0.51882%
CWE
-
Published
5/17/2022
Updated
1/30/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.main:jenkins-coremaven< 1.5861.586

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis is based on the provided patch and the understanding of the vulnerability. The functions identified are directly related to the handling of the HttpOnly flag for session cookies, either as part of the vulnerable code or as a mitigation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins ***or* *.*** *o*s not s*t t** *ttpOnly *l** in * S*t-*ooki* *****r *or s*ssion *ooki*s w**n run on Tom**t *.*.** or l*t*r, w*i** m*k*s it **si*r *or r*mot* *tt**k*rs to o*t*in pot*nti*lly s*nsitiv* in*orm*tion vi* s*ript ****ss to *ooki*s.

Reasoning

T** *n*lysis is **s** on t** provi*** p*t** *n* t** un**rst*n*in* o* t** vuln*r**ility. T** *un*tions i**nti*i** *r* *ir**tly r*l*t** to t** **n*lin* o* t** `*ttpOnly` *l** *or s*ssion *ooki*s, *it**r *s p*rt o* t** vuln*r**l* *o** or *s * miti**tion