Description
Jenkins instant-messaging Plugin 1.41 and earlier stores passwords for group chats unencrypted in the global configuration file of plugins based on Jenkins instant-messaging Plugin on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2161
http://www.openwall.com/lists/oss-security/2022/03/29/1
Related Vulnerabilities
CVE-2020-27196 Vulnerability in maven package com.typesafe.play:play-java
CVE-2020-9480 Vulnerability in maven package org.apache.spark:spark-network-common_2.12
CVE-2021-32662 Vulnerability in npm package techdocs-common
CVE-2020-28052 Vulnerability in maven package org.bouncycastle:bcprov-ext-jdk15on