vulnerability
Jenkins Advisory 2022-06-22: CVE-2022-34213: Passwords stored in plain text by Squash TM Publisher (Squash4Jenkins) Plugin
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Jun 23, 2022 | Jul 12, 2022 | Mar 27, 2026 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Jun 23, 2022
Added
Jul 12, 2022
Modified
Mar 27, 2026
Description
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Solutions
jenkins-lts-upgrade-2_332_4jenkins-upgrade-2_356
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.