#VU46957 Cleartext storage of sensitive information in ElasTest - CVE-2020-2274
Published: September 16, 2020 / Updated: May 3, 2021
ElasTest
Jenkins
Description
The vulnerability allows a local user to view the password on the target system.
The vulnerability exists due to the affected software stores its server password in plain text in the global configuration file "jenkins.plugins.elastest.ElasTestInstallation.xml". A local user with access to the Jenkins controller file system can obtain credentials.