Medium severity5.3NVD Advisory· Published Apr 7, 2016· Updated May 6, 2026
CVE-2016-0790
CVE-2016-0790
Description
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.main:jenkins-coreMaven | < 1.650 | 1.650 |
Affected products
3Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24nvdPatchVendor AdvisoryWEB
- github.com/advisories/GHSA-jgpr-qrw2-6gp3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2016-0790ghsaADVISORY
- rhn.redhat.com/errata/RHSA-2016-1773.htmlnvdWEB
- access.redhat.com/errata/RHSA-2016:0711nvdWEB
News mentions
0No linked articles in our index yet.