Miggo Logo

CVE-2020-2154:
Jenkins Zephyr for JIRA Test Management Plugin stores credentials in plain text

3.3

CVSS Score
3.1

Basic Information

EPSS Score
0.04804%
Published
5/24/2022
Updated
10/26/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:zephyr-for-jira-test-managementmaven<= 1.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unencrypted credential storage in an XML configuration file. Jenkins plugin architecture typically uses Descriptor/GlobalConfig classes for configuration management, and credential handling would normally use Secret fields or Credentials API. The advisory explicitly identifies com.thed.zephyr.jenkins.reporter.ZfjReporter.xml as the vulnerable file, implying the associated Java classes handling configuration persistence (like ZfjReporter or ZfjGlobalConfig) contain the vulnerable credential storage logic. Confidence is medium rather than high because the exact code implementation isn't available for verification, but the pattern matches Jenkins plugin vulnerability patterns for CWE-256/CWE-312.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Z*p*yr *or JIR* T*st M*n***m*nt Plu*in *.* *n* **rli*r stor*s Jir* *r***nti*ls un*n*rypt** in its *lo**l *on*i*ur*tion *il* `*om.t***.z*p*yr.j*nkins.r*port*r.Z*jR*port*r.xml` on t** J*nkins *ontroll*r. T**s* *r***nti*ls **n ** vi*w** *y us*rs wit* **

Reasoning

T** vuln*r**ility st*ms *rom un*n*rypt** *r***nti*l stor*** in *n XML *on*i*ur*tion *il*. J*nkins plu*in *r**it**tur* typi**lly us*s `**s*riptor/*lo**l*on*i*` *l*ss*s *or *on*i*ur*tion m*n***m*nt, *n* *r***nti*l **n*lin* woul* norm*lly us* `S**r*t` *