Lucene search

K
cve551230f0-3615-47bd-b7cc-93e92e730bbfCVE-2023-49113
HistoryJun 20, 2024 - 1:15 p.m.

CVE-2023-49113

2024-06-2013:15:49
CWE-312
551230f0-3615-47bd-b7cc-93e92e730bbf
web.nvd.nist.gov
22
kiuwan sast
local analyzer
hard-coded secrets
plain text
confidentiality
jar files
credential compromise
github
encryptor key
cve-2023-49113

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

The Kiuwan Local Analyzer (KLA) Java scanning application contains several
hard-coded secrets in plain text format. In some cases, this can
potentially compromise the confidentiality of the scan results.Β Several credentials were found in the JAR files of the Kiuwan Local Analyzer.

The
JAR file β€œlib.engine/insight/optimyth-insight.jar” contains the file
β€œInsightServicesConfig.properties”, which has the configuration tokens
β€œinsight.github.user” as well as β€œinsight.github.password” prefilled
with credentials. At least the specified username corresponds to a valid
GitHub account.Β The
JAR file β€œlib.engine/insight/optimyth-insight.jar” also contains the
file β€œes/als/security/Encryptor.properties”, in which the key used for
encrypting the results of any performed scan.

This issue affects Kiuwan SAST: <master.1808.p685.q13371

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "SAST Local Analyzer",
    "vendor": "Kiuwan",
    "versions": [
      {
        "status": "affected",
        "version": "<master.1808.p685.q13371",
        "versionType": "custom"
      }
    ]
  }
]

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2023-49113