Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6991 | Jenkins Generic Webhook Trigger Plugin 1.84.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token. |
Github GHSA |
GHSA-2jxx-2x93-2q2f | Non-constant time webhook token comparison in Jenkins Generic Webhook Trigger Plugin |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 08 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-05-08T19:18:09.268Z
Reserved: 2022-10-18T00:00:00.000Z
Link: CVE-2022-43412
Updated: 2024-08-03T13:32:58.730Z
Status : Modified
Published: 2022-10-19T16:15:10.773
Modified: 2025-05-08T20:15:27.793
Link: CVE-2022-43412
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA