Description
Jenkins NeoLoad Plugin 2.2.5 and earlier stored credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
Remediation
References
https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1427
https://www.zerodayinitiative.com/advisories/ZDI-19-932/
http://www.openwall.com/lists/oss-security/2019/10/16/6
Related Vulnerabilities
CVE-2023-39155 Vulnerability in maven package org.jenkins-ci.plugins:chef-identity
CVE-2022-3782 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2023-25827 Vulnerability in maven package net.opentsdb:opentsdb
CVE-2020-6454 Vulnerability in npm package electron
CVE-2021-41182 Vulnerability in maven package org.webjars:jquery-ui