Miggo Logo

CVE-2020-2153:
Credentials transmitted in plain text by Backlog Plugin

3.1

CVSS Score

Basic Information

EPSS Score
-
Published
5/24/2022
Updated
12/13/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:backlogmaven< 2.52.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows these functions were modified to return Secret objects instead of decrypted strings. Previously, they used Secret.toString() to return plaintext credentials, which were transmitted unencrypted in configuration forms. The vulnerability stemmed from exposing decrypted secrets through these accessors during form submission.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

***klo* Plu*in stor*s *r***nti*ls in jo* `*on*i*.xml` *il*s *s p*rt o* its *on*i*ur*tion. W*il* t** *r***nti*ls *r* stor** *n*rypt** on *isk, t**y *r* tr*nsmitt** in pl*in t*xt *s p*rt o* t** *on*i*ur*tion *orm *y ***klo* Plu*in *.* *n* **rli*r. T**

Reasoning

T** *ommit *i** s*ows t**s* *un*tions w*r* mo*i*i** to r*turn S**r*t o*j**ts inst*** o* ***rypt** strin*s. Pr*viously, t**y us** S**r*t.toStrin*() to r*turn pl*int*xt *r***nti*ls, w*i** w*r* tr*nsmitt** un*n*rypt** in *on*i*ur*tion *orms. T** vuln*r*