Lucene search

K
githubGitHub Advisory DatabaseGHSA-F9F9-4R63-4QCC
HistoryOct 19, 2022 - 7:00 p.m.

Non-constant time webhook token comparison in Jenkins GitLab Plugin

2022-10-1919:00:22
CWE-203
CWE-208
GitHub Advisory Database
github.com
11
jenkins
gitlab plugin
webhook token.

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

33.7%

GitLab Plugin 1.5.35 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal.

This could potentially allow attackers to use statistical methods to obtain a valid webhook token.

GitLab Plugin 1.5.36 uses a constant-time comparison when validating the webhook token.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchjdk_parameter_plugin

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

33.7%

Related for GHSA-F9F9-4R63-4QCC