Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a constant-time comparison function for validating connection secrets, which could potentially allow an attacker to use a timing attack to obtain this secret.
https://access.redhat.com/errata/RHSA-2020:0683
https://access.redhat.com/errata/RHSA-2020:0681
https://access.redhat.com/errata/RHBA-2020:0675
https://access.redhat.com/errata/RHBA-2020:0402
http://www.openwall.com/lists/oss-security/2020/01/29/1
https://jenkins.io/security/advisory/2020-01-29/#SECURITY-1659
Source: Mitre, NVD
Published: 2020-01-29
Updated: 2024-11-21
Base Score: 3.5
Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N
Severity: Low
Base Score: 5.3
Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Severity: Medium
EPSS: 0.00748