{"id":"CVE-2023-46657","details":"Jenkins Gogs Plugin 1.0.15 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.","aliases":["GHSA-885r-hhpr-cc9p"],"modified":"2026-03-15T22:47:35.229805Z","published":"2023-10-25T18:17:40.263Z","references":[{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-2896"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2023/10/25/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/gogs-webhook-plugin","events":[{"introduced":"0"},{"last_affected":"dcc45cdf4bb80ff1d0860834b520a95c9d79f179"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.0.15"}]}}],"versions":["gogs-webhook-1.0.0","gogs-webhook-1.0.10","gogs-webhook-1.0.11","gogs-webhook-1.0.12","gogs-webhook-1.0.13","gogs-webhook-1.0.14","gogs-webhook-1.0.15","gogs-webhook-1.0.2","gogs-webhook-1.0.3","gogs-webhook-1.0.4","gogs-webhook-1.0.5","gogs-webhook-1.0.6","gogs-webhook-1.0.7","gogs-webhook-1.0.8","gogs-webhook-1.0.9","v0.8.13","v0.8.45","v1.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46657.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}