First published: Wed Feb 12 2020(Updated: )
Jenkins Harvest SCM Plugin 0.5.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Harvest Scm | <=0.5.1 | |
maven/org.jenkins-ci.plugins:harvest | <=0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2131 has a medium severity rating due to the potential exposure of sensitive credentials.
To fix CVE-2020-2131, upgrade the Jenkins Harvest SCM Plugin to version 0.5.2 or later.
The potential impacts of CVE-2020-2131 include unauthorized access to stored passwords for users with Extended Read permission.
Users of Jenkins Harvest SCM Plugin version 0.5.1 and earlier are affected by CVE-2020-2131.
There is no effective workaround for CVE-2020-2131 other than upgrading to the patched version.