Lucene search

K
cve[email protected]CVE-2022-43411
HistoryOct 19, 2022 - 4:15 p.m.

CVE-2022-43411

2022-10-1916:15:10
CWE-203
web.nvd.nist.gov
45
4
cve-2022-43411
jenkins
gitlab plugin
security vulnerability
webhook token

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

33.6%

Jenkins GitLab Plugin 1.5.35 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

Affected configurations

NVD
Node
jenkinsgitlabRange<1.5.36jenkins
CPENameOperatorVersion
jenkins:gitlabjenkins gitlablt1.5.36

CNA Affected

[
  {
    "product": "Jenkins GitLab Plugin",
    "vendor": "Jenkins project",
    "versions": [
      {
        "lessThanOrEqual": "1.5.35",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

33.6%

Related for CVE-2022-43411