CVE-2019-10405
MEDIUM NUCLEIJenkins < 2.176.3 - XSS
Title source: ruleDescription
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
Nuclei Templates (1)
Jenkins <=2.196 - Cookie Exposure
MEDIUMby c-sh0
Shodan:
http.favicon.hash:81586312 || cpe:"cpe:2.3:a:jenkins:jenkins" || product:"jenkins"
FOFA:
icon_hash=81586312
Scores
CVSS v3
5.4
EPSS
0.7983
EPSS Percentile
99.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (3)
jenkins/jenkins
< 2.176.3
jenkins/jenkins
< 2.196
org.jenkins-ci.main/jenkins-core
0 - 2.176.4Maven
Published
Sep 25, 2019
Tracked Since
Feb 18, 2026