Description
Jenkins SoapUI Pro Functional Testing Plugin 1.3 and earlier stores project passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/09/01/3
https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20%281%29
Related Vulnerabilities
CVE-2021-41248 Vulnerability in npm package graphiql
CVE-2020-5242 Vulnerability in maven package org.openhab.addons.bundles:org.openhab.transform.exec
CVE-2019-10742 Vulnerability in maven package org.webjars.bowergithub.axios:axios
CVE-2019-17531 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2018-1999026 Vulnerability in maven package de.tracetronic.jenkins.plugins:ecutest