Company
Date Published
Author
Tom Hacohen
Word count
1058
Language
English
Hacker News points
2

Summary

The issue with the Jenkins Generic Webhook Trigger Plugin and the Jenkins Gitlab plugin is a timing-based side-channel attack vulnerability, where an attacker can use a non-constant time comparison function to execute an oracle attack against the hash verification, potentially recovering a secret key used for signing webhooks. To mitigate this, constant-time comparison functions should be used instead of naive implementations that compare strings character by character, which can reveal information about the password or signature. The issue applies to webhooks, where an attacker may try to find a valid signature using timing attacks, but it cannot be mitigated on the sender side; instead, customers can use open-source webhook signature libraries provided by Svix to ensure secure verification of signatures.