#VU48234 Cleartext storage of sensitive information in AppSpider - CVE-2020-2314
Published: November 4, 2020 / Updated: November 9, 2020
AppSpider
Jenkins
Description
The vulnerability allows a local user to view the password on the target system.
The vulnerability exists due to the affected software stores a password unencrypted in its global configuration file "com.rapid7.jenkinspider.PostBuildScan.xml" on the Jenkins controller as part of its configuration. A local user with access to the Jenkins controller file system can obtain credentials.