Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses padLeft(32, '0') when it should use padLeft(64, '0') because SHA-256 produces 32 bytes which equates to 64 hex characters. This vulnerability is fixed in 2.2.
References
| Link | Resource |
|---|---|
| https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a | Patch |
| https://github.com/samrocketman/jervis/security/advisories/GHSA-67rj-pjg6-pq59 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-13 20:16
Updated : 2026-01-20 17:13
NVD link : CVE-2025-68702
Mitre link : CVE-2025-68702
CVE.ORG link : CVE-2025-68702
JSON object : View
Products Affected
samrocketman
- jervis
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
