Description
Jenkins CodeScan Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/09/25/3
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1551
Related Vulnerabilities
CVE-2018-16487 Vulnerability in maven package org.webjars:lodash
CVE-2021-25933 Vulnerability in maven package org.opennms:opennms-webapp
CVE-2018-12418 Vulnerability in maven package com.github.junrar:junrar
CVE-2022-25853 Vulnerability in npm package semver-tags
CVE-2010-2245 Vulnerability in maven package org.apache.wink:wink-server