logo

CVE-2017-1000114 org.datadog.jenkins.plugins:datadog

Package

Manager: maven
Name: org.datadog.jenkins.plugins:datadog
Vulnerable Version: >=0 <0.6.2

Severity

Level: Low

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00033 pctl0.07818

Details

Exposure of Sensitive Information in Jenkins Datadog plugin The Datadog Plugin stores an API key to access the Datadog service in the global Jenkins configuration. While the API key is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the API key for example through browser extensions or cross-site scripting vulnerabilities. The Datadog Plugin now encrypts the API key transmitted to administrators viewing the global configuration form.

Metadata

Created: 2022-05-17T00:33:21Z
Modified: 2022-11-01T22:37:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-hf7w-f4h4-9xp8/GHSA-hf7w-f4h4-9xp8.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-hf7w-f4h4-9xp8
Finding: F038
Auto approve: 1