Description
Jenkins SoapUI Pro Functional Testing Plugin 1.3 and earlier stores project passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/09/01/3
https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20%281%29
Related Vulnerabilities
CVE-2022-45400 Vulnerability in maven package org.jvnet.hudson.plugins:japex
CVE-2021-38542 Vulnerability in maven package org.apache.james:james-server
CVE-2023-49653 Vulnerability in maven package org.jenkins-ci.plugins:jira
CVE-2020-17527 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2019-16776 Vulnerability in maven package org.webjars.bower:npm