CVE-2019-10405

MEDIUM NUCLEI

Jenkins < 2.176.3 - XSS

Title source: rule

Description

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

Nuclei Templates (1)

Jenkins <=2.196 - Cookie Exposure
MEDIUMby c-sh0
Shodan: http.favicon.hash:81586312 || cpe:"cpe:2.3:a:jenkins:jenkins" || product:"jenkins"
FOFA: icon_hash=81586312

Scores

CVSS v3 5.4
EPSS 0.7983
EPSS Percentile 99.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (3)
jenkins/jenkins < 2.176.3
jenkins/jenkins < 2.196
org.jenkins-ci.main/jenkins-core 0 - 2.176.4Maven
Published Sep 25, 2019
Tracked Since Feb 18, 2026