Description
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.
Remediation
References
https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1849
http://www.openwall.com/lists/oss-security/2022/07/27/1
Related Vulnerabilities
CVE-2022-42743 Vulnerability in npm package deep-parse-json
CVE-2023-34238 Vulnerability in npm package gatsby-plugin-mdx
CVE-2022-25898 Vulnerability in maven package org.webjars.bowergithub.kjur:jsrsasign
CVE-2023-40014 Vulnerability in npm package @openzeppelin/contracts-upgradeable
CVE-2017-2648 Vulnerability in maven package org.jenkins-ci.plugins:ssh-slaves