Improper Token Validation in Jenkins Generic Webhook Trigger Plugin
CVE-2022-43412
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 19 October 2022
What is CVE-2022-43412?
The Generic Webhook Trigger Plugin for Jenkins versions up to 1.84.1 is vulnerable due to its use of a non-constant time comparison function for validating webhook tokens. This flaw could allow attackers to exploit the timing discrepancies inherent in the comparison process, potentially enabling them to deduce valid webhook tokens through statistical analysis. Such an exploit could facilitate unauthorized actions within Jenkins, making it critical for users to update their plugins and mitigate associated risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Generic Webhook Trigger Plugin <= 1.84.1
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved