First published: Wed Oct 04 2017(Updated: )
The Datadog Plugin stores an API key to access the Datadog service in the global Jenkins configuration. While the API key is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the API key for example through browser extensions or cross-site scripting vulnerabilities. The Datadog Plugin now encrypts the API key transmitted to administrators viewing the global configuration form.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Datadog | <=0.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000114 is categorized as a moderate severity vulnerability due to the potential exposure of sensitive API keys.
To fix CVE-2017-1000114, upgrade the Datadog Plugin for Jenkins to version 0.5.7 or later where the issue is resolved.
CVE-2017-1000114 affects the Datadog Plugin for Jenkins versions up to and including 0.5.6.
Yes, CVE-2017-1000114 can lead to data leaks as it exposes API keys in plain text during transmission.
CVE-2017-1000114 is primarily exploitable when the Jenkins configuration is accessed inappropriately, such as through browser extensions.