Lucene search

K
cve[email protected]CVE-2023-46660
HistoryOct 25, 2023 - 6:17 p.m.

CVE-2023-46660

2023-10-2518:17:40
CWE-697
web.nvd.nist.gov
18
cve-2023-46660
jenkins
zanata plugin
security vulnerability
webhook token
hash comparison
nvd

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.1%

Jenkins Zanata Plugin 0.6 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token hashes are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

Affected configurations

NVD
Node
jenkinszanataRange0.6jenkins
CPENameOperatorVersion
jenkins:zanatajenkins zanatale0.6

CNA Affected

[
  {
    "vendor": "Jenkins Project",
    "product": "Jenkins Zanata Plugin",
    "versions": [
      {
        "version": "0",
        "versionType": "maven",
        "lessThanOrEqual": "0.6",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.1%

Related for CVE-2023-46660