GHSA-mxcc-7h5m-x57r
GitHub Security Advisory
Jenkins GitHub plugin uses weak webhook signature function
✓ GitHub Reviewed
LOW
Has CVE
Advisory Details
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature. GitHub Plugin 1.34.5 uses a constant-time comparison when validating the webhook signature.
Affected Packages
Maven
com.coravy.hudson.plugins.github:github
Affected versions:
0
(fixed in 1.34.5)
Related CVEs
Key Information
2.5
/10
Dataset
Last updated: August 25, 2025 6:33 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.