Description
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/09/25/3
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1561
Related Vulnerabilities
CVE-2018-10237 Vulnerability in maven package com.google.guava:guava
CVE-2020-9497 Vulnerability in maven package org.apache.guacamole:guacamole
CVE-2021-33604 Vulnerability in maven package com.vaadin:flow-server
CVE-2020-27224 Vulnerability in npm package @theia/preview
CVE-2022-28366 Vulnerability in maven package net.sourceforge.htmlunit:neko-htmlunit