Session fixation vulnerability in Jenkins
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 6, 2023
Package
Affected versions
>= 2.292, <= 2.299
<= 2.289.1
Patched versions
2.300
2.289.2
Description
Published by the National Vulnerability Database
Jun 30, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 16, 2022
Last updated
Dec 6, 2023
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins.
This vulnerability was introduced in Jenkins 2.266 and LTS 2.277.1.
Jenkins 2.300, LTS 2.289.2 invalidates the previous session on login.
In case of problems, administrators can choose a different implementation by setting the Java system property
hudson.security.SecurityRealm.sessionFixationProtectionMode
to2
, or disable the fix entirely by setting that system property to0
.References