Unencrypted Storage of Server Password in Jenkins ElasTest Plugin
CVE-2020-2274 · MEDIUM Severity
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Learn more about our Cis Benchmark Audit For Server Software.