Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c9q6-g3hr-8gww

Опубликовано: 13 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 8.2
CVSS3: 5.9

Описание

Jervis Has Weak Random for Timing Attack Mitigation

Vulnerability

https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L593-L594

Uses java.util.Random() which is not cryptographically secure.

Impact

If an attacker can predict the random delays, they may still be able to perform timing attacks.

Patches

Jervis will use SecureRandom for timing randomization.

Upgrade to Jervis 2.2.

Workarounds

None

References

Пакеты

Наименование

net.gleske:jervis

maven
Затронутые версииВерсия исправления

< 2.2

2.2

EPSS

Процентиль: 13%
0.00043
Низкий

8.2 High

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-330

Связанные уязвимости

CVSS3: 7.5
nvd
26 дней назад

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses java.util.Random() which is not cryptographically secure for timing attack mitigation. This vulnerability is fixed in 2.2.

EPSS

Процентиль: 13%
0.00043
Низкий

8.2 High

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-330