Loading HuntDB...

GHSA-5pg8-f89x-wjcx

GitHub Security Advisory

Credentials transmitted in plain text by Jenkins Logstash Plugin

✓ GitHub Reviewed LOW Has CVE

Advisory Details

Logstash Plugin stores credentials in its global configuration file `jenkins.plugins.logstash.LogstashConfiguration.xml` on the Jenkins controller as part of its configuration.

While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Logstash Plugin 2.3.1 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations.

Logstash Plugin 2.3.2 transmits the credentials in its global configuration encrypted.

Affected Packages

Maven org.jenkins-ci.plugins:logstash
Affected versions: 0 (fixed in 2.3.2)

Related CVEs

Key Information

GHSA ID
GHSA-5pg8-f89x-wjcx
Published
May 24, 2022 5:10 PM
Last Modified
January 14, 2023 5:22 AM
CVSS Score
2.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:logstash
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 27, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.