Description
Jenkins White Source Plugin 19.1.1 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission (config.xml), or access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/07/02/7
https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1630
Related Vulnerabilities
CVE-2016-5004 Vulnerability in maven package org.apache.xmlrpc:xmlrpc
CVE-2017-6056 Vulnerability in maven package org.apache.tomcat:tomcat-coyote
CVE-2020-10800 Vulnerability in npm package lix
CVE-2020-26217 Vulnerability in maven package xstream:xstream
CVE-2021-21361 Vulnerability in maven package com.bmuschko:gradle-vagrant-plugin