Description
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/09/25/3
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1561
Related Vulnerabilities
CVE-2023-45648 Vulnerability in maven package org.apache.tomcat:tomcat
CVE-2022-28135 Vulnerability in maven package org.jvnet.hudson.plugins:instant-messaging
CVE-2020-6422 Vulnerability in maven package org.webjars.npm:electron
CVE-2019-0201 Vulnerability in maven package org.apache.zookeeper:zookeeper
CVE-2020-8840 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind