Vulnerability Details CVE-2020-2143
Jenkins Logstash Plugin 2.3.1 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 5.8%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2020-2143
-
cpe:2.3:a:jenkins:logstash:0.7
-
cpe:2.3:a:jenkins:logstash:0.7.1
-
cpe:2.3:a:jenkins:logstash:0.7.2
-
cpe:2.3:a:jenkins:logstash:0.7.3
-
cpe:2.3:a:jenkins:logstash:0.7.4
-
cpe:2.3:a:jenkins:logstash:0.8.0
-
cpe:2.3:a:jenkins:logstash:1.0.0
-
cpe:2.3:a:jenkins:logstash:1.0.1
-
cpe:2.3:a:jenkins:logstash:1.0.2
-
cpe:2.3:a:jenkins:logstash:1.0.3
-
cpe:2.3:a:jenkins:logstash:1.0.4
-
cpe:2.3:a:jenkins:logstash:1.1.0
-
cpe:2.3:a:jenkins:logstash:1.1.1
-
cpe:2.3:a:jenkins:logstash:1.2.0
-
cpe:2.3:a:jenkins:logstash:1.3.0
-
cpe:2.3:a:jenkins:logstash:1.4.0
-
cpe:2.3:a:jenkins:logstash:2.0.0
-
cpe:2.3:a:jenkins:logstash:2.1.0
-
cpe:2.3:a:jenkins:logstash:2.2.0
-
cpe:2.3:a:jenkins:logstash:2.3.0
-
cpe:2.3:a:jenkins:logstash:2.3.1