Description
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2022/11/15/4
https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2912
Related Vulnerabilities
CVE-2023-29215 Vulnerability in maven package org.apache.linkis:linkis-engineplugin-jdbc
CVE-2020-9498 Vulnerability in maven package org.apache.guacamole:guacamole
CVE-2020-14340 Vulnerability in maven package org.jboss.xnio:xnio-api
CVE-2022-24819 Vulnerability in maven package org.xwiki.platform:xwiki-platform-web-templates
CVE-2020-1714 Vulnerability in maven package org.keycloak:keycloak-common