Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.
2016-04-07T23:59:01.927
2025-04-12T10:46:40.837
Deferred
CVSSv3.0: 5.3 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | jenkins | jenkins | ≤ 1.642.1 | Yes |
Application | redhat | openshift | 3.1 | Yes |
Application | jenkins | jenkins | ≤ 1.649 | Yes |