Description
Jenkins Extensive Testing Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Remediation
References
https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1432
Related Vulnerabilities
CVE-2022-33140 Vulnerability in maven package org.apache.nifi:nifi-shell-authorizer
CVE-2015-3253 Vulnerability in maven package org.codehaus.groovy:groovy
CVE-2021-20293 Vulnerability in maven package org.jboss.resteasy:resteasy-core
CVE-2022-37422 Vulnerability in maven package fish.payara.server.internal.web:web-core
CVE-2020-13920 Vulnerability in maven package org.apache.activemq:activemq-broker