Authentication Token Vulnerability in Jenkins Configuration as Code Plugin
CVE-2022-23106
5.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 January 2022
Summary
The Jenkins Configuration as Code Plugin prior to version 1.56 employs a flawed token validation method, utilizing a non-constant time comparison function. This weakness permits attackers to leverage statistical techniques to derive a valid authentication token, potentially compromising security by gaining unauthorized access. Administrators are advised to review their installed versions and apply necessary updates to mitigate this risk.
Affected Version(s)
Jenkins Configuration as Code Plugin <= 1.55
Jenkins Configuration as Code Plugin 1.47.1
Jenkins Configuration as Code Plugin 1.53.1
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved