Non-Constant Time Comparison Vulnerability in Jenkins Gogs Plugin
CVE-2023-46657

5.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
25 October 2023

Summary

The Jenkins Gogs Plugin versions 1.0.15 and earlier are susceptible to a vulnerability in which a non-constant time comparison function is used during the evaluation of webhook tokens. This flaw allows malicious actors to exploit statistical methods to derive a valid webhook token by analyzing the response time variations. If successfully exploited, it could compromise the integrity of the webhook mechanism, exposing Jenkins instances to unauthorized access and potential attacks.

Affected Version(s)

Jenkins Gogs Plugin 0 <= 1.0.15

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.