S3 Explorer Plugin stores AWSSECRETACCESS_KEY in its global configuration file s3explorer.xml
on the Jenkins controller as part of its configuration.
While this secret is stored encrypted on disk, in S3 Explorer Plugin 1.0.8 and earlier the global configuration form does not mask the AWSSECRETACCESS_KEY form field, increasing the potential for attackers to observe and capture it.
{ "nvd_published_at": "2022-10-19T16:15:00Z", "github_reviewed_at": "2022-10-19T21:22:54Z", "severity": "LOW", "github_reviewed": true, "cwe_ids": [ "CWE-549" ] }