First published: Wed Sep 06 2023(Updated: )
Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Google Login | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41936 is a vulnerability in the Jenkins Google Login Plugin that allows attackers to obtain a valid token using statistical methods.
The severity of CVE-2023-41936 is high with a CVSS score of 7.5.
CVE-2023-41936 affects Jenkins Google Login Plugin versions 1.7 and earlier.
Attackers can exploit CVE-2023-41936 by using statistical methods to obtain a valid token.
Yes, the Jenkins security advisory provides details on how to fix CVE-2023-41936.