Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.
{
"severity": "CRITICAL",
"github_reviewed_at": "2022-11-02T00:40:17Z",
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"nvd_published_at": "2016-04-07T23:59:00Z"
}