Description
Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0587 | Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token. |
Github GHSA |
GHSA-fpj7-9xm6-8hgr | Observable Discrepancy and Observable Timing Discrepancy in Jenkins Configuration as Code Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T03:36:19.211Z
Reserved: 2022-01-11T00:00:00.000Z
Link: CVE-2022-23106
No data.
Status : Modified
Published: 2022-01-12T20:15:09.207
Modified: 2024-11-21T06:48:00.347
Link: CVE-2022-23106
OpenCVE Enrichment
No data.
EUVD
Github GHSA