Описание
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a constant-time comparison function for validating connection secrets, which could potentially allow an attacker to use a timing attack to obtain this secret.
Ссылки
- Mailing ListThird Party Advisory
- Vendor Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.204.1 (включая)Версия до 2.218 (включая)
Одно из
cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
EPSS
Процентиль: 82%
0.01645
Низкий
5.3 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-203
Связанные уязвимости
CVSS3: 5.3
redhat
около 6 лет назад
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a constant-time comparison function for validating connection secrets, which could potentially allow an attacker to use a timing attack to obtain this secret.
CVSS3: 5.3
debian
около 6 лет назад
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a const ...
CVSS3: 5.3
github
больше 3 лет назад
Non-constant time comparison of inbound TCP agent connection secret
EPSS
Процентиль: 82%
0.01645
Низкий
5.3 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-203