The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed in version 3.0.0.
References
Link | Resource |
---|---|
https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7 | Exploit Third Party Advisory |
https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44 | Exploit Third Party Advisory |
https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 | Patch Third Party Advisory |
https://github.com/bmuschko/gradle-vagrant-plugin/pull/20 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-03-09T00:40:18
Updated: 2021-03-09T00:40:17
Reserved: 2020-12-22T00:00:00
Link: CVE-2021-21361
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-03-09T01:15:13.230
Modified: 2021-03-16T18:57:50.093
Link: CVE-2021-21361
JSON object: View
Redhat Information
No data.
CWE