Description
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/09/25/3
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1561
Related Vulnerabilities
CVE-2019-10381 Vulnerability in maven package org.jenkins-ci.plugins:codefresh
CVE-2023-49656 Vulnerability in maven package org.jenkins-ci.plugins:matlab
CVE-2022-22984 Vulnerability in npm package snyk-gradle-plugin
CVE-2019-1003066 Vulnerability in maven package org.jvnet.hudson.plugins:bugzilla
CVE-2018-1000836 Vulnerability in maven package org.bedework.caleng:bw-calendar-engine-impl