CVE-2020-2143 – org.jenkins-ci.plugins:logstash
Package
Manager: maven
Name: org.jenkins-ci.plugins:logstash
Vulnerable Version: >=0 <2.3.2
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00027 pctl0.05835
Details
Credentials transmitted in plain text by Jenkins Logstash Plugin Logstash Plugin stores credentials in its global configuration file `jenkins.plugins.logstash.LogstashConfiguration.xml` on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Logstash Plugin 2.3.1 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations. Logstash Plugin 2.3.2 transmits the credentials in its global configuration encrypted.
Metadata
Created: 2022-05-24T17:10:28Z
Modified: 2023-01-14T05:22:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5pg8-f89x-wjcx/GHSA-5pg8-f89x-wjcx.json
CWE IDs: ["CWE-319"]
Alternative ID: GHSA-5pg8-f89x-wjcx
Finding: F017
Auto approve: 1