Lucene search

K
githubGitHub Advisory DatabaseGHSA-2XPQ-5952-38W3
HistoryOct 25, 2023 - 6:32 p.m.

Jenkins MSTeams Webhook Trigger Plugin uses non-constant time webhook token comparison

2023-10-2518:32:25
CWE-208
CWE-697
GitHub Advisory Database
github.com
3
jenkins
msteams
webhook
trigger
plugin
token
comparison
vulnerability
attackers
statistical methods
advisory
fix
software

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.0%

Jenkins MSTeams Webhook Trigger Plugin 0.1.1 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal.

This could potentially allow attackers to use statistical methods to obtain a valid webhook token.

As of publication of this advisory, there is no fix.

Affected configurations

Vulners
Node
jenkinsgeneric_webhook_triggerRange0.1.1jenkins

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.0%

Related for GHSA-2XPQ-5952-38W3