#VU64667 Unprotected storage of credentials in Squash TM Publisher (Squash4Jenkins) - CVE-2022-34213
Published: June 24, 2022
Squash TM Publisher (Squash4Jenkins)
Jenkins
Description
The vulnerability allows a local user to gain access to other users' credentials.
The vulnerability exists due to the affected plugin stores passwords unencrypted in its global configuration file org.jenkinsci.squashtm.core.SquashTMPublisher.xml on the Jenkins controller as part of its configuration. A local user can view contents of the configuration file and gain access to passwords for 3rd party integration.