CVE-2023-40339:
Jenkins Config File Provider Plugin improper credential masking vulnerability
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.40742%
CWE
-
Published
8/16/2023
Updated
1/5/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:config-file-provider | maven | < 953.v0432a | 953.v0432a |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from credential-containing configuration files being written to build logs without masking. The key functions are the content supply methods in ConfigProvider
and its implementations (AbstractCustomProvider/AbstractMavenSettingsProvider
), which provided credential-embedded content but did not implement the mechanism to identify sensitive strings for masking. The patch added getSensitiveContentForMasking
to collect credentials and a ConsoleLogFilter
to mask them, confirming these functions were the root cause. The ConfigFileBuildWrapper
's lack of masking decorator in older versions further corroborates this analysis.