The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed in version 3.0.0.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:48
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.3
v3 : 5.3 |
References | () https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7 - Exploit, Third Party Advisory | |
References | () https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44 - Exploit, Third Party Advisory | |
References | () https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 - Patch, Third Party Advisory | |
References | () https://github.com/bmuschko/gradle-vagrant-plugin/pull/20 - Patch, Third Party Advisory |
Information
Published : 2021-03-09 01:15
Updated : 2024-11-21 05:48
NVD link : CVE-2021-21361
Mitre link : CVE-2021-21361
CVE.ORG link : CVE-2021-21361
JSON object : View
Products Affected
vagrant_project
- vagrant
CWE
CWE-532
Insertion of Sensitive Information into Log File