First published: Wed Jul 27 2022(Updated: )
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.10.1675144701-1.el8 | 2-plugins-0:4.10.1675144701-1.el8 |
redhat/jenkins | <2-plugins-0:4.8.1672842762-1.el8 | 2-plugins-0:4.8.1672842762-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1675668922-1.el8 | 2-plugins-0:4.9.1675668922-1.el8 |
Jenkins Github | <=1.34.4 | |
<=1.34.4 | ||
maven/com.coravy.hudson.plugins.github:github | <=1.34.4 | 1.34.5 |
redhat/github | <1.34.5 | 1.34.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for Jenkins GitHub Plugin vulnerability is CVE-2022-36885.
The severity of CVE-2022-36885 is medium, with a CVSS score of 5.3.
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking webhook signatures.
The vulnerability allows attackers to use statistical methods to obtain a valid webhook signature.
To mitigate the vulnerability, update to Jenkins GitHub Plugin version 1.34.5 or later.