CVE-2023-24439:
Plaintext Storage of a Password in Jenkins JIRA Pipeline Steps Plugin
5.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.05598%
CWE
Published
1/26/2023
Updated
2/6/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:jira-steps | maven | <= 2.0.165.v8846cf59f3db |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unencrypted storage of private keys in JiraStepsConfig.xml
. Jenkins plugins typically use Java classes with DataBound setters/getters and XStream serialization for configuration. The functions responsible for setting the private key value (setPrivateKey()
) and persisting the configuration (save()
) would directly handle the plaintext storage. The advisory's explicit reference to JiraStepsConfig.xml
and lack of encryption mechanism confirms these functions are involved in the insecure storage.