vulnerability

Jenkins Advisory 2022-06-22: CVE-2022-34213: Passwords stored in plain text by Squash TM Publisher (Squash4Jenkins) Plugin

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Jun 23, 2022
Added
Jul 12, 2022
Modified
Aug 11, 2025

Description

Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

Solutions

jenkins-lts-upgrade-2_332_4jenkins-upgrade-2_356
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.