Description
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.
Remediation
References
Related Vulnerabilities
XOOPS CVE-2009-3963 Vulnerability (CVE-2009-3963)
Werkzeug WSGI Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-25577)
TYPO3 Improper Authentication Vulnerability (CVE-2009-0256)
Dotclear Other Vulnerability (CVE-2005-3957)
WordPress Plugin Publish to Schedule Cross-Site Scripting (4.5.4)