Description
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/08/07/1
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428
https://www.zerodayinitiative.com/advisories/ZDI-19-839/
Related Vulnerabilities
CVE-2021-43859 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2021-23382 Vulnerability in npm package postcss
CVE-2021-40146 Vulnerability in maven package org.apache.any23:apache-any23-core
CVE-2019-9658 Vulnerability in maven package com.puppycrawl.tools:checkstyle
CVE-2021-28163 Vulnerability in maven package org.eclipse.jetty:jetty-deploy