CVE-2023-2632: Jenkins Code Dx Plugin stores API keys in plain text
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.53121%
CWE
Published
5/16/2023
Updated
1/4/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:codedx | maven | < 4.0.0 | 4.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from three key aspects: 1) The getKey()
method directly returns unencrypted API keys stored in job configs
. 2) The doCheckKey
validation method handles plaintext credentials without masking. 3) The Jelly UI configuration
uses a textbox instead of credentials selector. The commit diff shows replacement of direct key storage with Credentials Plugin
integration (keyCredentialId
), removal of plaintext validation
, and UI changes to use credential selectors, confirming these were the vulnerable components.