Описание
Jenkins MSTeams Webhook Trigger Plugin uses non-constant time webhook token comparison
Jenkins MSTeams Webhook Trigger Plugin 0.1.1 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal.
This could potentially allow attackers to use statistical methods to obtain a valid webhook token.
As of publication of this advisory, there is no fix.
Пакеты
io.jenkins.plugins:teams-webhook-trigger
<= 0.1.1
Отсутствует
Связанные уязвимости
Jenkins MSTeams Webhook Trigger Plugin 0.1.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
Уязвимость плагина Jenkins MSTeams Webhook Trigger Plugin, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации