Description
Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/09/16/3
https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-2014
Related Vulnerabilities
CVE-2019-1003041 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2021-21277 Vulnerability in maven package org.webjars.npm:angular-expressions
CVE-2021-32643 Vulnerability in maven package org.http4s:http4s-core
CVE-2017-16070 Vulnerability in npm package nodecaffe
CVE-2017-2652 Vulnerability in maven package org.jvnet.hudson.plugins:distfork