Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "3.1"
},
{
"introduced": "0"
},
{
"last_affected": "1.649"
},
{
"introduced": "0"
},
{
"last_affected": "1.642.1"
}
]
}