Miggo Logo

CVE-2018-1000404:
Insufficiently Protected Credentials in Jenkins AWS CodeBuild Plugin

7.8

CVSS Score

Basic Information

EPSS Score
-
Published
5/13/2022
Updated
1/29/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.amazonaws:aws-codebuildmaven< 0.270.27

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from plaintext storage of AWS credentials. The commit f5bae39 shows critical changes: 1) AWSClientFactory switched awsSecretKey from String to Secret type, 2) CodeBuilder's constructor now uses Secret type for AWS secrets. These functions directly handled credential persistence without encryption in vulnerable versions. The CVE description confirms credentials were stored in config.xml files and transmitted in plaintext, matching the pre-patch function behavior.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins proj**t J*nkins *WS *o***uil* Plu*in v*rsion *.** *n* **rli*r *ont*ins * Insu**i*i*ntly Prot**t** *r***nti*ls vuln*r**ility in *WS*li*nt***tory.j*v*, *o***uil**r.j*v* t**t **n r*sult in *r***nti*ls *is*losur*. T*is *tt**k *pp**r to ** *xploit

Reasoning

T** vuln*r**ility st*ms *rom pl*int*xt stor*** o* *WS *r***nti*ls. T** *ommit ******* s*ows *riti**l ***n**s: *) *WS*li*nt***tory swit**** *wsS**r*tK*y *rom Strin* to S**r*t typ*, *) *o***uil**r's *onstru*tor now us*s S**r*t typ* *or *WS s**r*ts. T**