CVE-2020-2130: Passwords stored in plain text by Harvest SCM Plugin
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.1451%
CWE
Published
5/24/2022
Updated
10/26/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:harvest | maven | <= 0.5.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unencrypted password storage in XML configuration files. Jenkins plugins typically serialize configuration data using XStream, and the HarvestSCM class's password field would be directly serialized. The DescriptorImpl.configure() method would handle global configuration persistence. Both locations fail to use Jenkins' Secret class or equivalent encryption mechanisms before storage, violating credential protection best practices. The advisory explicitly identifies these two storage locations (global config and job config.xml), which map directly to these functions.