Loading HuntDB...

CVE-2022-36885

UNKNOWN
Published 2022-07-27T14:21:38
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2022-36885. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed LOW

Jenkins GitHub plugin uses weak webhook signature function

GHSA-mxcc-7h5m-x57r

Advisory Details

Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature. GitHub Plugin 1.34.5 uses a constant-time comparison when validating the webhook signature.

Affected Packages

Maven com.coravy.hudson.plugins.github:github
ECOSYSTEM: ≥0 <1.34.5

CVSS Scoring

CVSS Score

2.5

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

Advisory provided by GitHub Security Advisory Database. Published: July 28, 2022, Modified: January 5, 2024

References

Published: 2022-07-27T14:21:38
Last Modified: 2024-08-03T10:14:29.453Z
Copied to clipboard!