First published: Wed Feb 12 2020(Updated: )
Harvest SCM Plugin 0.5.1 and earlier stores SCM passwords unencrypted in its global configuration file `hudson.plugins.harvest.HarvestSCM.xml and in job config.xml` files on the Jenkins controller. These credentials can be viewed by users with Extended Read permission (job config.xml only) or access to the Jenkins controller file system (both).
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Harvest Scm | <=0.5.1 | |
maven/org.jenkins-ci.plugins:harvest | <=0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2130 is considered a medium-severity vulnerability due to its impact on password confidentiality.
To fix CVE-2020-2130, upgrade the Harvest SCM Plugin to version 0.5.2 or later.
CVE-2020-2130 allows unauthorized users with Extended Read permission to access unencrypted SCM passwords stored in configuration files.
CVE-2020-2130 affects Harvest SCM Plugin versions 0.5.1 and earlier.
Yes, CVE-2020-2130 allows sensitive SCM passwords to be viewed by users with appropriate permissions.