GHSA-jpcm-4485-69p7

Suggest an improvement
Source
https://github.com/advisories/GHSA-jpcm-4485-69p7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-jpcm-4485-69p7/GHSA-jpcm-4485-69p7.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-jpcm-4485-69p7
Aliases
Published
2021-03-09T00:38:41Z
Modified
2023-11-01T04:54:13.587020Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Sensitive information disclosure via log in com.bmuschko:gradle-vagrant-plugin
Details

Impact

The com.bmuschko:gradle-vagrant-plugin Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables.

When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors.

Patches

Fixed in version 3.0.0

References

  • https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44
  • https://github.com/bmuschko/gradle-vagrant-plugin/issues/19
  • https://github.com/bmuschko/gradle-vagrant-plugin/pull/20

For more information

If you have any questions or comments about this advisory: * Open an issue in bmuschko/gradle-vagrant-plugin

Database specific
{
    "nvd_published_at": "2021-03-09T01:15:00Z",
    "github_reviewed_at": "2021-03-09T00:38:15Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-532"
    ]
}
References

Affected packages

Maven / com.bmuschko:gradle-vagrant-plugin

Package

Name
com.bmuschko:gradle-vagrant-plugin
View open source insights on deps.dev
Purl
pkg:maven/com.bmuschko/gradle-vagrant-plugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.6
Fixed
3.0.0

Affected versions

2.*

2.2
2.2.1