Description
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/09/25/3
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1561
Related Vulnerabilities
CVE-2022-24999 Vulnerability in npm package qs
CVE-2022-36908 Vulnerability in maven package org.jenkins-ci.plugins:openshift-deployer
CVE-2021-34801 Vulnerability in npm package valine
CVE-2018-15756 Vulnerability in maven package org.springframework:spring-web
CVE-2019-11818 Vulnerability in maven package org.opencms:org.opencms.workplace.tools.accounts