-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| RPD:bmc-rpd | maven | <= 1.1 |
The vulnerability stems from unencrypted credential storage in RPDPluginConfiguration.xml. Jenkins plugins typically handle credentials via the Credentials API with automatic encryption. The explicit mention of this XML file and lack of encryption indicates the plugin's configuration management functions (setUserToken() for storing the value, and save() for persisting it) bypass standard credential protection mechanisms. The package structure and CWE mapping to plaintext storage strongly suggest these are the vulnerable functions.