Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01cGc4LWY4OXgtd2pjeM4AAjxy
Credentials transmitted in plain text by Jenkins Logstash Plugin
Logstash Plugin stores credentials in its global configuration file jenkins.plugins.logstash.LogstashConfiguration.xml
on the Jenkins controller as part of its configuration.
While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Logstash Plugin 2.3.1 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Logstash Plugin 2.3.2 transmits the credentials in its global configuration encrypted.
Permalink: https://github.com/advisories/GHSA-5pg8-f89x-wjcxJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01cGc4LWY4OXgtd2pjeM4AAjxy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: over 2 years ago
Updated: 9 months ago
CVSS Score: 3.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Identifiers: GHSA-5pg8-f89x-wjcx, CVE-2020-2143
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-2143
- https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1516
- http://www.openwall.com/lists/oss-security/2020/03/09/1
- https://github.com/jenkinsci/logstash-plugin/commit/b42d5c116473d11c79ebd2ff24e2643b9bce14d6
- https://github.com/advisories/GHSA-5pg8-f89x-wjcx
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:logstash
Affected Version Ranges: < 2.3.2Fixed in: 2.3.2