First published: Wed Oct 25 2023(Updated: )
Jenkins Zanata Plugin 0.6 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token hashes are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Zanata | <=0.6 | |
maven/org.jenkins-ci.plugins:zanata | <=0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46660 is a vulnerability in Jenkins Zanata Plugin version 0.6 and earlier, which allows attackers to obtain a valid webhook token by using statistical methods.
The severity of CVE-2023-46660 is medium with a CVSS score of 5.3.
CVE-2023-46660 affects Jenkins Zanata Plugin version 0.6 and earlier.
The CWE category of CVE-2023-46660 is CWE-208 and CWE-697.
To fix CVE-2023-46660, it is recommended to update Jenkins Zanata Plugin to a version higher than 0.6.