ghsa-hf7w-f4h4-9xp8
Vulnerability from github
Published
2022-05-17 00:33
Modified
2022-11-01 22:37
Severity ?
Summary
Exposure of Sensitive Information in Jenkins Datadog plugin
Details
The Datadog Plugin stores an API key to access the Datadog service in the global Jenkins configuration. While the API key is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the API key for example through browser extensions or cross-site scripting vulnerabilities. The Datadog Plugin now encrypts the API key transmitted to administrators viewing the global configuration form.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.datadog.jenkins.plugins:datadog" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.6.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2017-1000114" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": true, "github_reviewed_at": "2022-11-01T22:37:05Z", "nvd_published_at": "2017-10-05T01:29:00Z", "severity": "LOW" }, "details": "The Datadog Plugin stores an API key to access the Datadog service in the global Jenkins configuration. While the API key is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the API key for example through browser extensions or cross-site scripting vulnerabilities. The Datadog Plugin now encrypts the API key transmitted to administrators viewing the global configuration form.", "id": "GHSA-hf7w-f4h4-9xp8", "modified": "2022-11-01T22:37:05Z", "published": "2022-05-17T00:33:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000114" }, { "type": "WEB", "url": "https://jenkins.io/security/advisory/2017-08-07" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/100223" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Exposure of Sensitive Information in Jenkins Datadog plugin" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.