Unencrypted Storage of Server Password in Jenkins ElasTest Plugin

Unencrypted Storage of Server Password in Jenkins ElasTest Plugin

CVE-2020-2274 · MEDIUM Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

Learn more about our Cis Benchmark Audit For Server Software.