Description
The Datadog Plugin stores an API key to access the Datadog service in the global Jenkins configuration. While the API key is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the API key for example through browser extensions or cross-site scripting vulnerabilities. The Datadog Plugin now encrypts the API key transmitted to administrators viewing the global configuration form.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4132 | The Datadog Plugin stores an API key to access the Datadog service in the global Jenkins configuration. While the API key is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the API key for example through browser extensions or cross-site scripting vulnerabilities. The Datadog Plugin now encrypts the API key transmitted to administrators viewing the global configuration form. |
Github GHSA |
GHSA-hf7w-f4h4-9xp8 | Exposure of Sensitive Information in Jenkins Datadog plugin |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T21:53:06.833Z
Reserved: 2017-10-03T00:00:00.000Z
Link: CVE-2017-1000114
No data.
Status : Deferred
Published: 2017-10-05T01:29:04.540
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-1000114
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA