Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.
{ "nvd_published_at": "2016-04-07T23:59:00Z", "github_reviewed_at": "2022-11-02T00:40:17Z", "severity": "CRITICAL", "github_reviewed": true, "cwe_ids": [ "CWE-200" ] }