logo

CVE-2020-2095 com.redgate.plugins.redgatesqlci:redgate-sql-ci

Package

Manager: maven
Name: com.redgate.plugins.redgatesqlci:redgate-sql-ci
Vulnerable Version: >=0 <2.0.5

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00031 pctl0.07238

Details

Redgate SQL Change Automation Plugin stored credentials in plain text Redgate SQL Change Automation Plugin 2.0.4 and earlier stores a NuGet API key unencrypted in job config.xml files as part of its configuration. This credential could be viewed by users with Extended Read permission or access to the Jenkins controller file system. This is due to an incomplete fix of [SECURITY-1598](https://www.jenkins.io/security/advisory/2019-12-17/#SECURITY-1598). Redgate SQL Change Automation Plugin 2.0.5 now stores the API key encrypted. Existing jobs need to have their configuration saved for existing plain text passwords to be overwritten.

Metadata

Created: 2022-05-24T17:06:23Z
Modified: 2022-12-21T16:45:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-x23m-8c2h-6wg7/GHSA-x23m-8c2h-6wg7.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-x23m-8c2h-6wg7
Finding: F035
Auto approve: 1