First published: Tue May 16 2023(Updated: )
Jenkins Code Dx Plugin 3.1.0 and earlier does not mask Code Dx server API keys displayed on the configuration form, increasing the potential for attackers to observe and capture them.
Credit: disclosure@synopsys.com disclosure@synopsys.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:codedx | <4.0.0 | 4.0.0 |
Synopsys Code Dx | <=3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2633 is considered a high-severity vulnerability due to the risk of leaking sensitive API keys.
To fix CVE-2023-2633, upgrade the Jenkins Code Dx Plugin to version 4.0.0 or later.
CVE-2023-2633 affects unencrypted Code Dx server API keys that are displayed in the configuration form.
Jenkins Code Dx Plugin versions 3.1.0 and earlier are vulnerable to CVE-2023-2633.
Attackers can exploit CVE-2023-2633 by observing and capturing unmasked API keys displayed in the Jenkins configuration form.