Description
Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2787
Related Vulnerabilities
CVE-2019-16303 Vulnerability in npm package generator-jhipster
CVE-2023-46650 Vulnerability in maven package com.coravy.hudson.plugins.github:github
CVE-2010-1870 Vulnerability in maven package com.opensymphony:xwork-core
CVE-2020-2271 Vulnerability in maven package org.jenkins-ci.plugins:locked-files-report
CVE-2022-36891 Vulnerability in maven package org.jenkins-ci.plugins:deployer-framework