Improper Token Validation in Jenkins Generic Webhook Trigger Plugin
CVE-2022-43412
5.3MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 19 October 2022
What is CVE-2022-43412?
The Generic Webhook Trigger Plugin for Jenkins versions up to 1.84.1 is vulnerable due to its use of a non-constant time comparison function for validating webhook tokens. This flaw could allow attackers to exploit the timing discrepancies inherent in the comparison process, potentially enabling them to deduce valid webhook tokens through statistical analysis. Such an exploit could facilitate unauthorized actions within Jenkins, making it critical for users to update their plugins and mitigate associated risks.
Affected Version(s)
Jenkins Generic Webhook Trigger Plugin <= 1.84.1