Description
Jenkins OpsGenie Plugin 1.9 and earlier stores API keys unencrypted in its global configuration file and in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission (config.xml), or access to the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1877
Related Vulnerabilities
CVE-2018-14042 Vulnerability in maven package org.webjars.bower:bootstrap-sass
CVE-2013-7397 Vulnerability in maven package com.ning:async-http-client
CVE-2019-1003091 Vulnerability in maven package com.soasta.jenkins:cloudtest
CVE-2023-22899 Vulnerability in maven package net.lingala.zip4j:zip4j
CVE-2015-0226 Vulnerability in maven package org.apache.ws.security:wss4j