Description
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2089
Related Vulnerabilities
CVE-2011-4838 Vulnerability in maven package com.sun.grizzly:jruby
CVE-2011-5064 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2021-21619 Vulnerability in maven package org.jenkins-ci.plugins:claim
CVE-2023-24447 Vulnerability in maven package org.jenkins-ci.plugins:rabbitmq-consumer
CVE-2022-34176 Vulnerability in maven package org.jenkins-ci.plugins:junit