Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01cGc4LWY4OXgtd2pjeM4AAjxy

Credentials transmitted in plain text by Jenkins Logstash Plugin

Logstash Plugin stores credentials in its global configuration file jenkins.plugins.logstash.LogstashConfiguration.xml on the Jenkins controller as part of its configuration.

While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Logstash Plugin 2.3.1 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations.

Logstash Plugin 2.3.2 transmits the credentials in its global configuration encrypted.

Permalink: https://github.com/advisories/GHSA-5pg8-f89x-wjcx
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01cGc4LWY4OXgtd2pjeM4AAjxy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: almost 2 years ago
Updated: 5 months ago


CVSS Score: 3.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

Identifiers: GHSA-5pg8-f89x-wjcx, CVE-2020-2143
References: Repository: https://github.com/jenkinsci/logstash-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:logstash
Affected Version Ranges: < 2.3.2
Fixed in: 2.3.2