Jenkins Datadog Plugin 5.4.1: Missing permission check allows credential exfiltration
CVE-2023-37944 Published on July 12, 2023
A missing permission check in Jenkins Datadog Plugin 5.4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Products Associated with CVE-2023-37944
Want to know whenever a new CVE is published for Jenkins Datadog? stack.watch will email you.
Affected Versions
Jenkins Project Jenkins Datadog Plugin:- Before and including 5.4.1 is affected.
Exploit Probability
EPSS
0.10%
Percentile
27.23%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.