Description
Jenkins Audit to Database Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
https://jenkins.io/security/advisory/2019-04-03/#SECURITY-966
http://www.securityfocus.com/bid/107790
http://www.openwall.com/lists/oss-security/2019/04/12/2
Related Vulnerabilities
CVE-2014-7839 Vulnerability in maven package org.jboss.resteasy:resteasy-jaxrs
CVE-2020-15842 Vulnerability in maven package com.liferay:com.liferay.portal.template.freemarker
CVE-2023-39151 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2023-3691 Vulnerability in maven package org.webjars.bowergithub.layui:layui
CVE-2019-10282 Vulnerability in maven package hudson.plugins.klaros:klaros-testmanagement