First published: Mon Mar 09 2020(Updated: )
Backlog Plugin stores credentials in job `config.xml` files as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Backlog Plugin 2.4 and earlier. These credentials could be viewed by users with Extended Read permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Backlog | <=2.4 | |
maven/org.jenkins-ci.plugins:backlog | <2.5 | 2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2153 is rated as a medium severity vulnerability due to the exposure of credentials during transmission.
To remediate CVE-2020-2153, upgrade the Backlog Plugin to version 2.5 or later.
CVE-2020-2153 affects Backlog Plugin versions 2.4 and earlier.
CVE-2020-2153 is a credential exposure vulnerability due to plain text transmission.
Users of the Backlog Plugin on Jenkins with version 2.4 or earlier are affected by CVE-2020-2153.