Miggo Logo

CVE-2018-1999031: Jenkins meliora-testlab Plugin allows attackers with file system access to Jenkins master to obtain API key

3.3

CVSS Score
3.0

Basic Information

EPSS Score
0.22669%
Published
5/14/2022
Updated
12/18/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:meliora-testlabmaven<= 1.141.15

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from handling API keys in plain text. Key evidence includes:

  1. The 'apiKey' field was changed from String to Secret type in the code
  2. Configuration Jelly files were updated from textbox to password fields
  3. The commit message explicitly mentions encrypting API keys in configuration
  4. The perform() method was modified to use Secret.getPlainText() for decryption These functions directly handled sensitive data storage/retrieval without encryption in <=1.14 versions, matching the vulnerability description.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n *xposur* o* s*nsitiv* in*orm*tion vuln*r**ility *xists in J*nkins m*lior*-t*stl** Plu*in *.** *n* **rli*r in T*stl**Noti*i*r.j*v* t**t *llows *tt**k*rs wit* *il* syst*m ****ss to t** J*nkins m*st*r to o*t*in t** *PI k*y stor** in t*is plu*in's *on

Reasoning

T** vuln*r**ility st*ms *rom **n*lin* *PI k*ys in pl*in t*xt. K*y *vi**n** in*lu**s: *. T** '*piK*y' *i*l* w*s ***n*** *rom Strin* to S**r*t typ* in t** *o** *. *on*i*ur*tion J*lly *il*s w*r* up**t** *rom t*xt*ox to p*sswor* *i*l*s *. T** *ommit m*ss