Description
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/09/25/3
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1561
Related Vulnerabilities
CVE-2020-11023 Vulnerability in maven package org.webjars:jquery
CVE-2019-1003078 Vulnerability in maven package org.jenkins-ci.plugins:labmanager
CVE-2020-13926 Vulnerability in maven package org.apache.kylin:kylin-server
CVE-2020-5258 Vulnerability in maven package org.webjars.npm:dojo
CVE-2019-10286 Vulnerability in maven package com.openmake:deployhub