Miggo Logo

CVE-2020-2149:
Credentials transmitted in plain text by Repository Connector Plugin

3.1

CVSS Score
3.1

Basic Information

EPSS Score
0.05627%
Published
5/24/2022
Updated
1/30/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:repository-connectormaven<= 1.2.62.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from credentials being transmitted in plaintext during configuration form submission. Jenkins plugins typically handle configuration via a configure method in their descriptor/configuration class. The advisory explicitly states credentials are stored encrypted on disk but transmitted in plaintext, indicating the form-handling code (like RepositoryConfiguration.configure()) processes raw credentials without secure transmission mechanisms. This matches Jenkins plugin architecture patterns where form data binding occurs in such methods.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

R*pository *onn**tor Plu*in stor*s *r***nti*ls in its *lo**l *on*i*ur*tion *il* `or*.jvn*t.*u*son.plu*ins.r*pository*onn**tor.R*pository*on*i*ur*tion.xml` on t** J*nkins *ontroll*r *s p*rt o* its *on*i*ur*tion. W*il* t** *r***nti*ls *r* stor** *n*ry

Reasoning

T** vuln*r**ility st*ms *rom *r***nti*ls **in* tr*nsmitt** in pl*int*xt *urin* *on*i*ur*tion *orm su*mission. J*nkins plu*ins typi**lly **n*l* *on*i*ur*tion vi* * `*on*i*ur*` m*t*o* in t**ir **s*riptor/*on*i*ur*tion *l*ss. T** **visory *xpli*itly st*