Lucene search

K
githubGitHub Advisory DatabaseGHSA-86J9-25M2-9W97
HistoryOct 25, 2023 - 6:32 p.m.

Non-constant time webhook token hash comparison in Jenkins Zanata Plugin

2023-10-2518:32:25
CWE-208
CWE-697
GitHub Advisory Database
github.com
8
jenkins
zanata plugin
token hash
vulnerability
security

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.1%

Jenkins Zanata Plugin 0.6 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token hashes are equal.

This could potentially allow attackers to use statistical methods to obtain a valid webhook token.

As of publication of this advisory, there is no fix.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchzanata
CPENameOperatorVersion
org.jenkins-ci.plugins:zanatale0.6

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.1%

Related for GHSA-86J9-25M2-9W97