Description
Jenkins CodeScan Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/09/25/3
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1551
Related Vulnerabilities
CVE-2019-19771 Vulnerability in npm package singale
CVE-2023-37961 Vulnerability in maven package org.jenkins-ci.plugins:assembla-auth
CVE-2019-9153 Vulnerability in maven package org.webjars.npm:openpgp
CVE-2022-2047 Vulnerability in maven package org.eclipse.jetty:jetty-http
CVE-2014-3623 Vulnerability in maven package org.apache.ws.security:wss4j