VYPR
Medium severity5.3NVD Advisory· Published Apr 7, 2016· Updated May 6, 2026

CVE-2016-0790

CVE-2016-0790

Description

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.main:jenkins-coreMaven
< 1.6501.650

Affected products

3
  • Jenkins/Jenkins2 versions
    cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*+ 1 more
    • cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*range: <=1.642.1
    • cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*range: <=1.649
  • cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.