logo

CVE-2020-2101 org.jenkins-ci.main:jenkins-core

Package

Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.204.2 || >=2.205 <2.219

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.02369 pctl0.84365

Details

Non-constant time comparison of inbound TCP agent connection secret Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not use a constant-time comparison validating the connection secret when an inbound TCP agent connection is initiated. This could potentially allow attackers to use statistical methods to obtain the connection secret. Jenkins 2.219, LTS 2.204.2 now uses a constant-time comparison function for verifying connection secrets.

Metadata

Created: 2022-05-24T17:07:40Z
Modified: 2022-12-19T21:06:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w7jr-wqw6-54xc/GHSA-w7jr-wqw6-54xc.json
CWE IDs: ["CWE-203", "CWE-208"]
Alternative ID: GHSA-w7jr-wqw6-54xc
Finding: F047
Auto approve: 1