Vulnerability Details CVE-2022-34803
Jenkins OpsGenie Plugin 1.9 and earlier stores API keys unencrypted in its global configuration file and in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission (config.xml), or access to the Jenkins controller file system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 66.3%
CVSS Severity
CVSS v3 Score 4.3
CVSS v2 Score 4.0
Products affected by CVE-2022-34803
-
cpe:2.3:a:jenkins:opsgenie:1.1
-
cpe:2.3:a:jenkins:opsgenie:1.2
-
cpe:2.3:a:jenkins:opsgenie:1.5
-
cpe:2.3:a:jenkins:opsgenie:1.8
-
cpe:2.3:a:jenkins:opsgenie:1.9