Description
Jenkins OpsGenie Plugin 1.9 and earlier stores API keys unencrypted in its global configuration file and in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission (config.xml), or access to the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1877
Related Vulnerabilities
CVE-2016-0706 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2011-2732 Vulnerability in maven package org.springframework.security:spring-security-core
CVE-2012-3451 Vulnerability in maven package org.apache.cxf:cxf-bundle
CVE-2023-22893 Vulnerability in npm package @strapi/plugin-users-permissions
CVE-2022-41966 Vulnerability in maven package com.thoughtworks.xstream:xstream