Description
Jenkins GitLab Plugin 1.5.35 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: Low
Integrity: None
Availability: None
Affected Packages3 packages
🔴Vulnerability Details
3OSVNon-constant time webhook token comparison in Jenkins GitLab Plugin↗2022-10-19 ▶ CVEListCVE-2022-43411: Jenkins GitLab Plugin 1↗2022-10-19 ▶ GHSANon-constant time webhook token comparison in Jenkins GitLab Plugin↗2022-10-19 ▶ 📋Vendor Advisories
2GitLabCVE-2022-43411: Jenkins GitLab Plugin 1.5.35 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token ar↗2022-10-19 ▶ JenkinsJenkins Security Advisory 2022-10-19↗2022-10-19 ▶