Description
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2089
Related Vulnerabilities
CVE-2023-28677 Vulnerability in maven package org.jenkins-ci.plugins:convert-to-pipeline
CVE-2023-28326 Vulnerability in maven package org.apache.openmeetings:openmeetings-parent
CVE-2017-2613 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2023-35926 Vulnerability in npm package @backstage/plugin-scaffolder-backend
CVE-2022-45393 Vulnerability in maven package org.jenkins-ci.plugins:delete-log-plugin