First published: Wed Oct 19 2022(Updated: )
Jenkins Generic Webhook Trigger Plugin 1.84.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Generic Webhook Trigger | <1.84.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43412 is a vulnerability in the Jenkins Generic Webhook Trigger Plugin that allows attackers to obtain a valid webhook token.
The severity of CVE-2022-43412 is medium, with a CVSS score of 5.3.
CVE-2022-43412 affects Jenkins Generic Webhook Trigger Plugin versions 1.84.1 and earlier.
Attackers can potentially use statistical methods to obtain a valid webhook token by exploiting CVE-2022-43412.
To mitigate CVE-2022-43412, update to version 1.84.2 or later of the Jenkins Generic Webhook Trigger Plugin.