Description
Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2787
Related Vulnerabilities
CVE-2023-37478 Vulnerability in npm package @pnpm/exe
CVE-2022-34777 Vulnerability in maven package org.jenkins-ci.plugins:gitlab-plugin
CVE-2018-5382 Vulnerability in maven package org.bouncycastle:bcprov-jdk14
CVE-2020-2149 Vulnerability in maven package org.jenkins-ci.plugins:repository-connector
CVE-2023-50776 Vulnerability in maven package com.cloudtp.jenkins:paaslane-estimate