CVE-2022-43411

CWE-203CWE-2086 documents6 sources
Severity
5.3MEDIUM
EPSS
0.4%
top 37.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19

Description

Jenkins GitLab Plugin 1.5.35 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

CVEListV5jenkins_project/jenkins_gitlab_pluginunspecified1.5.35
NVDjenkins/gitlab< 1.5.36

🔴Vulnerability Details

3
OSV
Non-constant time webhook token comparison in Jenkins GitLab Plugin2022-10-19
CVEList
CVE-2022-43411: Jenkins GitLab Plugin 12022-10-19
GHSA
Non-constant time webhook token comparison in Jenkins GitLab Plugin2022-10-19

📋Vendor Advisories

2
GitLab
CVE-2022-43411: Jenkins GitLab Plugin 1.5.35 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token ar2022-10-19
Jenkins
Jenkins Security Advisory 2022-10-192022-10-19
CVE-2022-43411 (MEDIUM CVSS 5.3) | Jenkins GitLab Plugin 1.5.35 and ea | cvebase.io