Required CVE Record Information
Description
Jenkins White Source Plugin 19.1.1 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission (config.xml), or access to the master file system.
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 2 Total
- https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1630 x_transferred
- openwall.com: [oss-security] 20200702 Multiple vulnerabilities in Jenkins plugins mailing-listx_transferred