Description
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/08/07/1
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428
https://www.zerodayinitiative.com/advisories/ZDI-19-839/
Related Vulnerabilities
CVE-2021-39233 Vulnerability in maven package org.apache.ozone:ozone-main
CVE-2020-6464 Vulnerability in npm package electron
CVE-2019-10461 Vulnerability in maven package org.jenkins-ci.plugins:dynatrace-dashboard
CVE-2020-7785 Vulnerability in npm package node-ps
CVE-2022-2047 Vulnerability in maven package org.eclipse.jetty:jetty-http