CVE-2017-1000114 – org.datadog.jenkins.plugins:datadog
Package
Manager: maven
Name: org.datadog.jenkins.plugins:datadog
Vulnerable Version: >=0 <0.6.2
Severity
Level: Low
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00033 pctl0.07818
Details
Exposure of Sensitive Information in Jenkins Datadog plugin The Datadog Plugin stores an API key to access the Datadog service in the global Jenkins configuration. While the API key is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the API key for example through browser extensions or cross-site scripting vulnerabilities. The Datadog Plugin now encrypts the API key transmitted to administrators viewing the global configuration form.
Metadata
Created: 2022-05-17T00:33:21Z
Modified: 2022-11-01T22:37:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-hf7w-f4h4-9xp8/GHSA-hf7w-f4h4-9xp8.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-hf7w-f4h4-9xp8
Finding: F038
Auto approve: 1