#VU18069 Cleartext storage of sensitive information in ECS publisher
Published: March 25, 2019
ECS publisher
Jenkins
Description
The disclosed vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to application stores the API token unencrypted in jobs' config.xml files and its global configuration file on the Jenkins master. A user with Extended Read permission or access to the master file system can obtain to the API token.