The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed in version 3.0.0.
References
Link | Resource |
---|---|
https://github.com/bmuschko/gradle-vagrant-plugin/pull/20 | Patch Third Party Advisory |
https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44 | Exploit Third Party Advisory |
https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 | Patch Third Party Advisory |
https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-03-08 17:15
Updated : 2021-03-16 11:57
NVD link : CVE-2021-21361
Mitre link : CVE-2021-21361
JSON object : View
CWE
CWE-532
Insertion of Sensitive Information into Log File
Products Affected
vagrant_project
- vagrant