#VU65019 Cleartext storage of sensitive information in Elasticsearch Query - CVE-2022-34807
Published: July 8, 2022
Elasticsearch Query
Jenkins
Description
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to the affected plugin stores a password unencrypted in its global configuration file org.jenkinsci.plugins.elasticsearchquery.ElasticsearchQueryBuilder.xml on the Jenkins controller as part of its configuration. A local user can gain unauthorized access to sensitive information on the system.