CVE-2023-2633:
Jenkins Code Dx Plugin displays API keys in plain text
4.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/16/2023
Updated
1/4/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:codedx | maven | < 4.0.0 | 4.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from plaintext storage and display of API keys in job configurations. Key evidence includes: 1) The constructor directly stores unencrypted 'key' parameter. 2) getKey() exposes the plaintext value. 3) perform() uses the raw key for API communication. 4) Project ID dropdown population (doFillProjectIdItems) required handling the plaintext key. The commit diff shows these were replaced with credential ID handling in v4.0.0, confirming these were the vulnerable points. The config.jelly's textbox (replaced with credentials selector) also contributed to exposure but is handled at the UI layer rather than code functions.