Improper Token Validation in Jenkins Generic Webhook Trigger Plugin
CVE-2022-43412
5.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 19 October 2022
Summary
The Generic Webhook Trigger Plugin for Jenkins versions up to 1.84.1 is vulnerable due to its use of a non-constant time comparison function for validating webhook tokens. This flaw could allow attackers to exploit the timing discrepancies inherent in the comparison process, potentially enabling them to deduce valid webhook tokens through statistical analysis. Such an exploit could facilitate unauthorized actions within Jenkins, making it critical for users to update their plugins and mitigate associated risks.
Affected Version(s)
Jenkins Generic Webhook Trigger Plugin <= 1.84.1
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved