vulnerability
Arch Linux: Cross-site request forgery (CVE-2019-10384)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Aug 28, 2019 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Aug 28, 2019
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Jenkins allowed the creation of CSRF tokens without a corresponding web session ID. This is the result of an incomplete fix for SECURITY-626 in the 2019-07-17 security advisory. This allowed attackers able to obtain a CSRF token without associated session ID to implement CSRF attacks with the following constraints. The token had to be created for the anonymous user (and could only be used for actions the anonymous user can perform). The victim’s IP address needed to remain unchanged (unless the proxy compatibility option was enabled) The victim must not have a valid web session at the time of the attack. CSRF token generation now creates a web session if none exists yet, so that the lack of a web session ID cannot be exploited.
Solution
arch-linux-upgrade-latest
References
- CVE-2019-10384
- https://attackerkb.com/topics/CVE-2019-10384
- URL-http://www.openwall.com/lists/oss-security/2019/08/28/4
- URL-https://access.redhat.com/errata/RHSA-2019:2789
- URL-https://access.redhat.com/errata/RHSA-2019:3144
- URL-https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491
- URL-https://security.archlinux.org/ASA-201908-22
- URL-https://www.oracle.com/security-alerts/cpuapr2022.html
- CWE-352
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.