Critical severity9.8NVD Advisory· Published Apr 7, 2016· Updated May 6, 2026
CVE-2016-0791
CVE-2016-0791
Description
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.main:jenkins-coreMaven | < 1.650 | 1.650 |
Affected products
3Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24nvdPatchVendor AdvisoryWEB
- github.com/advisories/GHSA-jmw7-ph6p-33ccghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2016-0791ghsaADVISORY
- rhn.redhat.com/errata/RHSA-2016-1773.htmlnvdWEB
- access.redhat.com/errata/RHSA-2016:0711nvdWEB
News mentions
0No linked articles in our index yet.