Description
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/08/07/1
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428
https://www.zerodayinitiative.com/advisories/ZDI-19-839/
Related Vulnerabilities
CVE-2022-36527 Vulnerability in maven package com.jflyfox:jflyfox_jfinal
CVE-2015-3250 Vulnerability in maven package org.apache.directory.api:api-all
CVE-2018-1304 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2022-42004 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2019-1003060 Vulnerability in maven package org.jenkins-ci.plugins:zap