Description
A user-supplied regular expression in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier was processed in a way that wasn't interruptible, allowing attackers to have Jenkins evaluate a regular expression without the ability to interrupt this process.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/12/17/1
https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651
Related Vulnerabilities
CVE-2021-33561 Vulnerability in maven package com.shopizer:shopizer
CVE-2022-21680 Vulnerability in npm package marked
CVE-2020-7709 Vulnerability in maven package org.webjars.npm:json-pointer
CVE-2018-1000644 Vulnerability in maven package org.eclipse.rdf4j:rdf4j-rio-rdfxml
CVE-2022-41253 Vulnerability in maven package org.jenkins-ci.plugins:cons3rt