Description
Jenkins White Source Plugin 19.1.1 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission (config.xml), or access to the master file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/07/02/7
https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1630
Related Vulnerabilities
CVE-2022-29894 Vulnerability in npm package strapi
CVE-2020-4051 Vulnerability in maven package org.webjars.bowergithub.dojo:dijit
CVE-2019-16869 Vulnerability in maven package io.netty:netty
CVE-2022-41654 Vulnerability in npm package ghost
CVE-2020-16041 Vulnerability in maven package org.webjars.npm:electron