Description
Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: Low
Integrity: None
Availability: None
Affected Packages3 packages
🔴Vulnerability Details
3CVEListCVE-2024-23903: Jenkins GitLab Branch Source Plugin 684↗2024-01-24 ▶ GHSANon-constant time webhook token comparison in Jenkins GitLab Branch Source Plugin↗2024-01-24 ▶ OSVNon-constant time webhook token comparison in Jenkins GitLab Branch Source Plugin↗2024-01-24 ▶ 📋Vendor Advisories
2GitLabCVE-2024-23903: Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier uses a non-constant time comparison function when checking whether the provided an↗2024-01-24 ▶ JenkinsJenkins Security Advisory 2024-01-24↗2024-01-24 ▶