vulnerability

Jenkins Advisory 2022-06-22: CVE-2022-34213: Passwords stored in plain text by Squash TM Publisher (Squash4Jenkins) Plugin

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Jun 23, 2022
Added
Jul 12, 2022
Modified
Mar 27, 2026

Description

Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

Solutions

jenkins-lts-upgrade-2_332_4jenkins-upgrade-2_356
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.