CVE-2020-2132:
Password stored in plain text by Parasoft Environment Manager Plugin
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.1451%
CWE
Published
5/24/2022
Updated
12/13/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.parasoft:environment-manager | maven | < 2.15 | 2.15 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key elements: 1) The password field was declared as a String
type rather than Jenkins' secure Secret
type, allowing plaintext storage. 2) The getRepoPassword()
method exposed the plaintext value directly. The commit diff shows both the field type change (String→Secret
) and the getter modification to use Secret.getPlainText()
, confirming these were the vulnerable points. The CWE-256 classification (plaintext storage) directly maps to these implementation choices.