Description
Jenkins OpsGenie Plugin 1.9 and earlier stores API keys unencrypted in its global configuration file and in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission (config.xml), or access to the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1877
Related Vulnerabilities
CVE-2008-5515 Vulnerability in maven package org.apache.tomcat:catalina
CVE-2016-6814 Vulnerability in maven package org.codehaus.groovy:groovy-all
CVE-2011-4367 Vulnerability in maven package org.apache.myfaces.core:myfaces-core-project
CVE-2009-1190 Vulnerability in maven package org.springframework:spring-core
CVE-2023-37959 Vulnerability in maven package org.jenkins-ci.plugins:sumologic-publisher