-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.jenkins.plugins:teams-webhook-trigger | maven | <= 0.1.1 |
The vulnerability explicitly describes a non-constant time token comparison, which is a classic case of using insecure string equality checks (like Java's String.equals()). Jenkins plugins typically handle webhook validation in dedicated validator classes, and the lack of constant-time comparison aligns with CWE-208 and CWE-697. While no exact code is available, the pattern matches known vulnerable implementations in similar webhook handlers.