Description
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/08/07/1
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428
https://www.zerodayinitiative.com/advisories/ZDI-19-839/
Related Vulnerabilities
CVE-2021-39185 Vulnerability in maven package org.http4s:http4s-server
CVE-2020-7697 Vulnerability in npm package mock2easy
CVE-2020-7619 Vulnerability in npm package get-git-data
CVE-2021-45029 Vulnerability in maven package org.apache.shenyu:shenyu-common
CVE-2019-14517 Vulnerability in maven package org.webjars.npm:editor.md