Jenkins Sonar Quality Gates Plugin transmits credentials in plain text during configuration
        
  Low severity
        
          GitHub Reviewed
      
        Published
          May 24, 2022 
          to the GitHub Advisory Database
          •
          Updated Jan 30, 2023 
      
  
Package
Affected versions
<= 1.3.1
  Patched versions
None
  Description
        Published by the National Vulnerability Database
      Mar 9, 2020 
    
  
        Published to the GitHub Advisory Database
      May 24, 2022 
    
  
        Reviewed
      Jan 6, 2023 
    
  
        Last updated
      Jan 30, 2023 
    
  
Sonar Quality Gates Plugin stores credentials in its global configuration file
org.quality.gates.jenkins.plugin.GlobalConfig.xmlon the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Sonar Quality Gates Plugin 1.3.1 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations.References