Lucene search

K
githubGitHub Advisory DatabaseGHSA-885R-HHPR-CC9P
HistoryOct 25, 2023 - 6:32 p.m.

Jenkins Gogs Plugin uses non-constant time webhook token comparison

2023-10-2518:32:25
CWE-208
CWE-697
GitHub Advisory Database
github.com
3
jenkins
gogs plugin
webhook
token
comparison
vulnerability
attackers
statistical methods
publication
advisory
software

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.0%

Jenkins Gogs Plugin 1.0.15 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal.

This could potentially allow attackers to use statistical methods to obtain a valid webhook token.

As of publication of this advisory, there is no fix.

Affected configurations

Vulners
Node
jenkinsmsteams_webhook_triggerRange1.0.15jenkins

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.0%

Related for GHSA-885R-HHPR-CC9P