Non-constant Time Comparison in Jenkins GitHub Plugin Reveals Weakness
CVE-2022-36885
5.3MEDIUM
Summary
The Jenkins GitHub Plugin versions 1.34.4 and earlier exhibit a significant security flaw due to the use of a non-constant time comparison function for webhook signatures. This vulnerability allows attackers to leverage statistical methods to discern valid webhook signatures, potentially compromising the integrity of the webhook communications. Such a weakness opens the door for unauthorized actions to be performed on behalf of users, highlighting the critical need for timely updates and patching to enhance the security of Jenkins installations.
Affected Version(s)
Jenkins GitHub Plugin <= 1.34.4
Jenkins GitHub Plugin 1.34.3.1
Jenkins GitHub Plugin 1.34.1.1
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved