Description
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2022/11/15/4
https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2912
Related Vulnerabilities
CVE-2019-16777 Vulnerability in maven package org.webjars.bower:npm
CVE-2020-7638 Vulnerability in npm package confinit
CVE-2022-45208 Vulnerability in maven package org.jeecgframework.boot:jeecg-module-system
CVE-2020-35728 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2021-23797 Vulnerability in npm package http-server-node