Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v3fv-v9m6-26g3

Опубликовано: 16 мая 2023
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Jenkins HashiCorp Vault Plugin has improper masking of credentials

Jenkins HashiCorp Vault Plugin 360.v0a_1c04cf807d and earlier does not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met:

  • The credentials are printed in build steps executing on an agent (typically inside a node block).

  • Push mode for durable task logging is enabled. This is a hidden option in Pipeline: Nodes and Processes that can be enabled through the Java system property org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING. It is also automatically enabled by some plugins, e.g., OpenTelemetry and Pipeline Logging over CloudWatch.

An improvement in Credentials Binding 523.525.vb_72269281873 implements a workaround that applies build log masking even in affected plugins. This workaround is temporary and potentially incomplete, so it is still recommended that affected plugins be updated to resolve this issue.

As of publication of this advisory, there is no fix.

Пакеты

Наименование

com.datapipe.jenkins.plugins:hashicorp-vault-plugin

maven
Затронутые версииВерсия исправления

<= 360.v0a

Отсутствует

EPSS

Процентиль: 47%
0.00245
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-532

Связанные уязвимости

CVSS3: 7.5
nvd
больше 2 лет назад

Jenkins HashiCorp Vault Plugin 360.v0a_1c04cf807d and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.

CVSS3: 7.5
fstec
больше 2 лет назад

Уязвимость плагина Jenkins HashiCorp Vault Plugin, связанная с раскрытием информации, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 47%
0.00245
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-532