Description
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/09/25/3
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1561
Related Vulnerabilities
CVE-2019-19771 Vulnerability in npm package crpyto-js
CVE-2020-2163 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2021-26544 Vulnerability in maven package org.apache.livy:livy-server
CVE-2023-37957 Vulnerability in maven package io.jenkins.plugins:pipeline-restful-api
CVE-2019-1353 Vulnerability in maven package org.webjars.npm:nodegit