Описание
Jenkins Gogs Plugin uses non-constant time webhook token comparison
Jenkins Gogs Plugin 1.0.15 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal.
This could potentially allow attackers to use statistical methods to obtain a valid webhook token.
As of publication of this advisory, there is no fix.
Пакеты
org.jenkins-ci.plugins:gogs-webhook
<= 1.0.15
Отсутствует
Связанные уязвимости
Jenkins Gogs Plugin 1.0.15 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
Уязвимость плагина Jenkins Gogs Plugin, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации