This security bulletin contains information about 1 vulnerabilities.
Added fixed version.
Exploit availability: NoDescription
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to affected plugin stores project passwords in job "config.xml" files on the Jenkins controller as part of its configuration. A remote user with Extended Read permission can gain access to sensitive data.Mitigation
Install update from vendor's website.
SoapUI Pro Functional Testing: 1.0 - 1.5CPE2.3
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?