Jenkins MSTeams Webhook Trigger Plugin 0.1.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Msteams_webhook_trigger | Jenkins | 0.1.0 (including) | 0.1.0 (including) |
Msteams_webhook_trigger | Jenkins | 0.1.1 (including) | 0.1.1 (including) |
This Pillar covers several possibilities: