logo

CVE-2020-2143 org.jenkins-ci.plugins:logstash

Package

Manager: maven
Name: org.jenkins-ci.plugins:logstash
Vulnerable Version: >=0 <2.3.2

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00027 pctl0.05835

Details

Credentials transmitted in plain text by Jenkins Logstash Plugin Logstash Plugin stores credentials in its global configuration file `jenkins.plugins.logstash.LogstashConfiguration.xml` on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Logstash Plugin 2.3.1 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations. Logstash Plugin 2.3.2 transmits the credentials in its global configuration encrypted.

Metadata

Created: 2022-05-24T17:10:28Z
Modified: 2023-01-14T05:22:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5pg8-f89x-wjcx/GHSA-5pg8-f89x-wjcx.json
CWE IDs: ["CWE-319"]
Alternative ID: GHSA-5pg8-f89x-wjcx
Finding: F017
Auto approve: 1