CVE-2020-2095 – com.redgate.plugins.redgatesqlci:redgate-sql-ci
Package
Manager: maven
Name: com.redgate.plugins.redgatesqlci:redgate-sql-ci
Vulnerable Version: >=0 <2.0.5
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00031 pctl0.07238
Details
Redgate SQL Change Automation Plugin stored credentials in plain text Redgate SQL Change Automation Plugin 2.0.4 and earlier stores a NuGet API key unencrypted in job config.xml files as part of its configuration. This credential could be viewed by users with Extended Read permission or access to the Jenkins controller file system. This is due to an incomplete fix of [SECURITY-1598](https://www.jenkins.io/security/advisory/2019-12-17/#SECURITY-1598). Redgate SQL Change Automation Plugin 2.0.5 now stores the API key encrypted. Existing jobs need to have their configuration saved for existing plain text passwords to be overwritten.
Metadata
Created: 2022-05-24T17:06:23Z
Modified: 2022-12-21T16:45:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-x23m-8c2h-6wg7/GHSA-x23m-8c2h-6wg7.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-x23m-8c2h-6wg7
Finding: F035
Auto approve: 1