First published: Mon Mar 09 2020(Updated: )
Jenkins Logstash Plugin 2.3.1 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:logstash | <2.3.2 | 2.3.2 |
Logstash Management API | <=2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2143 is classified as a high severity vulnerability due to the potential exposure of sensitive credentials.
To fix CVE-2020-2143, upgrade the Jenkins Logstash Plugin to version 2.3.2 or later.
CVE-2020-2143 may lead to the exposure of sensitive credentials stored in plain text, affecting the security of your Jenkins environment.
CVE-2020-2143 affects Jenkins Logstash Plugin versions 2.3.1 and earlier.
Yes, the exposure from CVE-2020-2143 is persistent as credentials are stored in the global configuration file.