vulnerability
Jenkins Advisory 2022-06-22: CVE-2022-34213: Passwords stored in plain text by Squash TM Publisher (Squash4Jenkins) Plugin
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Jun 23, 2022 | Jul 12, 2022 | Aug 11, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Jun 23, 2022
Added
Jul 12, 2022
Modified
Aug 11, 2025
Description
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Solutions
jenkins-lts-upgrade-2_332_4jenkins-upgrade-2_356
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.