-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.main:jenkins-core | maven | <= 2.176.1 | 2.176.2 |
| org.jenkins-ci.main:jenkins-core | maven | >= 2.177, <= 2.185 | 2.186 |
The vulnerability stemmed from CSRF tokens not expiring due to missing session binding. The commit 7721523 shows the fix added session ID to the crumb calculation in DefaultCrumbIssuer.issueCrumb(). The pre-patch code (lines 75-87) lacked session ID inclusion, while post-patch added session ID checks. The test case DefaultCrumbIssuerSEC626Test explicitly validates session-bound token expiration, confirming this function's role in the vulnerability.
A Semantic Attack on Google Gemini - Read the Latest Research