Description
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/08/07/1
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428
https://www.zerodayinitiative.com/advisories/ZDI-19-839/
Related Vulnerabilities
CVE-2020-13936 Vulnerability in maven package org.apache.velocity:velocity-engine-core
CVE-2020-17519 Vulnerability in maven package org.apache.flink:flink-runtime_2.11
CVE-2023-45648 Vulnerability in maven package org.apache.tomcat:tomcat
CVE-2022-45384 Vulnerability in maven package org.jenkins-ci.plugins:reverse-proxy-auth-plugin