First published: Wed Jan 15 2020(Updated: )
Jenkins Redgate SQL Change Automation Plugin 2.0.4 and earlier stored an API key unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Redgate Sql Change Automation | <=2.0.4 | |
maven/com.redgate.plugins.redgatesqlci:redgate-sql-ci | <2.0.5 | 2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2095 is categorized as a medium severity vulnerability due to the exposure of sensitive API keys.
To fix CVE-2020-2095, upgrade the Redgate SQL Change Automation Plugin to version 2.0.5 or later.
CVE-2020-2095 affects users of Jenkins running Redgate SQL Change Automation Plugin version 2.0.4 and earlier.
CVE-2020-2095 exposes unencrypted API keys stored in job config.xml files.
Exploiting CVE-2020-2095 requires users to have Extended Read permission or access to the Jenkins master file system.