Description
Jenkins eggPlant Plugin 2.2 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/08/07/1
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1430
https://www.zerodayinitiative.com/advisories/ZDI-19-834/
Related Vulnerabilities
CVE-2019-10757 Vulnerability in maven package org.webjars.npm:knex
CVE-2022-36886 Vulnerability in maven package org.jenkins-ci.plugins:external-monitor-job
CVE-2023-46750 Vulnerability in maven package org.apache.shiro:shiro-web
CVE-2020-5258 Vulnerability in maven package org.webjars.npm:dojo
CVE-2018-11778 Vulnerability in maven package org.apache.ranger:ranger