Description
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428
http://www.openwall.com/lists/oss-security/2019/08/07/1
https://www.zerodayinitiative.com/advisories/ZDI-19-839/
Related Vulnerabilities
CVE-2022-45379 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2020-6454 Vulnerability in maven package org.webjars.npm:electron
CVE-2017-1000389 Vulnerability in maven package org.jenkins-ci.plugins:plugin
CVE-2012-5887 Vulnerability in maven package tomcat:catalina
CVE-2022-23618 Vulnerability in maven package org.xwiki.platform:xwiki-platform-oldcore