Vulnerability Details CVE-2023-40343
Jenkins Tuleap Authentication Plugin 1.1.20 and earlier uses a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 28.3%
CVSS Severity
CVSS v3 Score 5.9
Products affected by CVE-2023-40343
-
cpe:2.3:a:jenkins:tuleap_authentication:1.0.0
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.0
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.1
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.10
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.11
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.12
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.13
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.14
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.15
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.16
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.17
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.18
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.19
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.20
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.3
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.4
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.5
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.6
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.7
-
cpe:2.3:a:jenkins:tuleap_authentication:1.1.9