Description
Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Remediation
References
https://jenkins.io/security/advisory/2017-10-23/
http://www.securityfocus.com/bid/101544
Related Vulnerabilities
CVE-2021-28170 Vulnerability in maven package org.glassfish:jakarta.el
CVE-2017-12649 Vulnerability in maven package com.liferay:com.liferay.asset.browser.web
CVE-2021-31403 Vulnerability in maven package com.vaadin:vaadin-server
CVE-2023-37905 Vulnerability in npm package ckeditor-wordcount-plugin
CVE-2023-31062 Vulnerability in maven package org.apache.inlong:manager-dao