Description
The Datadog Plugin stores an API key to access the Datadog service in the global Jenkins configuration. While the API key is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the API key for example through browser extensions or cross-site scripting vulnerabilities. The Datadog Plugin now encrypts the API key transmitted to administrators viewing the global configuration form.
Remediation
References
https://jenkins.io/security/advisory/2017-08-07/
http://www.securityfocus.com/bid/100223
Related Vulnerabilities
CVE-2022-36886 Vulnerability in maven package org.jenkins-ci.plugins:external-monitor-job
CVE-2012-0838 Vulnerability in maven package org.apache.struts.xwork:xwork-core
CVE-2022-2932 Vulnerability in npm package mobiledoc-kit
CVE-2014-7816 Vulnerability in maven package io.undertow:undertow-core
CVE-2021-27644 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-server