Description
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/09/25/3
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1561
Related Vulnerabilities
CVE-2016-0706 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2022-31943 Vulnerability in maven package net.mingsoft:ms-mcms
CVE-2022-42466 Vulnerability in maven package org.apache.isis.commons:isis-commons
CVE-2020-7746 Vulnerability in maven package org.webjars.bowergithub.chartjs:chart.js