#VU47513 Cleartext storage of sensitive information in couchdb-statistics - CVE-2020-2291
Published: October 8, 2020 / Updated: October 12, 2020
couchdb-statistics
Jenkins
Description
The vulnerability allows a local user to view the password on the target system.
The vulnerability exists due to the affected software stores its server password unencrypted in its global configuration file "org.jenkinsci.plugins.couchstats.CouchStatsConfig.xml" on the Jenkins controller as part of its configuration. A local user with access to the Jenkins controller file system can obtain credentials.