GHSA-5pg8-f89x-wjcx

Suggest an improvement
Source
https://github.com/advisories/GHSA-5pg8-f89x-wjcx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5pg8-f89x-wjcx/GHSA-5pg8-f89x-wjcx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5pg8-f89x-wjcx
Aliases
Published
2022-05-24T17:10:28Z
Modified
2024-02-16T07:58:56.251213Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Credentials transmitted in plain text by Jenkins Logstash Plugin
Details

Logstash Plugin stores credentials in its global configuration file jenkins.plugins.logstash.LogstashConfiguration.xml on the Jenkins controller as part of its configuration.

While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Logstash Plugin 2.3.1 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations.

Logstash Plugin 2.3.2 transmits the credentials in its global configuration encrypted.

References

Affected packages

Maven / org.jenkins-ci.plugins:logstash

Package

Name
org.jenkins-ci.plugins:logstash
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/logstash

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.2

Affected versions

-rc203.*

-rc203.c5e91b42cf67

0.*

0.7
0.7.1
0.7.2
0.7.3
0.7.4
0.8.0

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.1.0
1.1.1
1.2.0
1.3.0
1.4.0

2.*

2.0.0
2.1.0
2.2.0
2.3.0
2.3.1