Lucene search

K
cve[email protected]CVE-2023-2632
HistoryMay 16, 2023 - 6:15 p.m.

CVE-2023-2632

2023-05-1618:15:17
CWE-256
CWE-522
web.nvd.nist.gov
18
cve-2023
jenkins
code dx plugin
api keys
unencrypted
security vulnerability

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.4%

Jenkins Code Dx Plugin 3.1.0 and earlier stores Code Dx server API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Affected configurations

NVD
Node
jenkinscode_dxRange3.1.0jenkins
CPENameOperatorVersion
jenkins:code_dxjenkins code dxle3.1.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Jenkins Code Dx Plugin",
    "vendor": "Jenkins",
    "versions": [
      {
        "lessThanOrEqual": "3.1.0",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.4%