Опубликовано: 13 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 8.2
CVSS3: 5.9
Описание
Jervis Has Weak Random for Timing Attack Mitigation
Vulnerability
Uses java.util.Random() which is not cryptographically secure.
Impact
If an attacker can predict the random delays, they may still be able to perform timing attacks.
Patches
Jervis will use SecureRandom for timing randomization.
Upgrade to Jervis 2.2.
Workarounds
None
References
Ссылки
- https://github.com/samrocketman/jervis/security/advisories/GHSA-c9q6-g3hr-8gww
- https://nvd.nist.gov/vuln/detail/CVE-2025-68704
- https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a
- https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L593-L594
- http://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a
Пакеты
Наименование
net.gleske:jervis
maven
Затронутые версииВерсия исправления
< 2.2
2.2
Связанные уязвимости
CVSS3: 7.5
nvd
26 дней назад
Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses java.util.Random() which is not cryptographically secure for timing attack mitigation. This vulnerability is fixed in 2.2.