Description
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2089
Related Vulnerabilities
CVE-2022-25186 Vulnerability in maven package com.datapipe.jenkins.plugins:hashicorp-vault-plugin
CVE-2021-31805 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2019-10349 Vulnerability in maven package org.jenkins-ci.plugins:depgraph-view
CVE-2022-29036 Vulnerability in maven package org.jenkins-ci.plugins:promoted-builds
CVE-2021-20293 Vulnerability in maven package org.jboss.resteasy:resteasy-core