An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01cGc4LWY4OXgtd2pjeM4AAjxy
Credentials transmitted in plain text by Jenkins Logstash Plugin
Logstash Plugin stores credentials in its global configuration file
jenkins.plugins.logstash.LogstashConfiguration.xml on the Jenkins controller as part of its configuration.
While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Logstash Plugin 2.3.1 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Logstash Plugin 2.3.2 transmits the credentials in its global configuration encrypted.Permalink: https://github.com/advisories/GHSA-5pg8-f89x-wjcx
Source: GitHub Advisory Database
Published: over 1 year ago
Updated: 8 months ago
CVSS Score: 3.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Identifiers: GHSA-5pg8-f89x-wjcx, CVE-2020-2143
Fixed in: 2.3.2