A user-supplied regular expression in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier was processed in a way that wasn't interruptible, allowing attackers to have Jenkins evaluate a regular expression without the ability to interrupt this process.
{ "nvd_published_at": "2019-12-17T15:15:00Z", "cwe_ids": [ "CWE-1333", "CWE-400" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-11-01T22:49:28Z" }