Configuration as Code Plugin up to 1.55 on Jenkins Authentication Token timing discrepancy

A vulnerability classified as problematic was found in Configuration as Code Plugin up to 1.55 on Jenkins (Jenkins Plugin). Affected by this vulnerability is an unknown code of the component Authentication Token Handler. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Field01/13/2022 07:30 AM01/15/2022 02:42 PM
nameConfiguration as Code PluginConfiguration as Code Plugin
version<=1.55<=1.55
platformJenkinsJenkins
componentAuthentication Token HandlerAuthentication Token Handler
cwe208208
risk11
cvss3_vuldb_acHH
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iNN
cvss3_vuldb_aNN
cvss3_vuldb_rcCC
urlhttps://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2141https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2141
cveCVE-2022-23106CVE-2022-23106
cve_assigned16418556001641855600
date1642028400 (01/13/2022)1642028400 (01/13/2022)
typeJenkins PluginJenkins Plugin
cvss2_vuldb_acHH
cvss2_vuldb_ciPP
cvss2_vuldb_iiNN
cvss2_vuldb_aiNN
cvss2_vuldb_rcCC
cvss2_vuldb_avAA
cvss2_vuldb_auSS
cvss2_vuldb_eNDND
cvss2_vuldb_rlNDND
cvss3_vuldb_avAA
cvss3_vuldb_prLL
cvss3_vuldb_eXX
cvss3_vuldb_rlXX
cvss2_vuldb_basescore1.41.4
cvss2_vuldb_tempscore1.41.4
cvss3_vuldb_basescore2.62.6
cvss3_vuldb_tempscore2.62.6
cvss3_meta_basescore2.62.6
cvss3_meta_tempscore2.62.6
price_0day$0-$5k$0-$5k
confirm_urlhttps://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2141
cve_nvd_summaryJenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.

Do you want to use VulDB in your project?

Use the official API to access entries easily!