Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-49113: CWE-312 Cleartext Storage of Sensitive Information in Kiuwan SAST Local Analyzer

0
High
VulnerabilityCVE-2023-49113cvecve-2023-49113cwe-312
Published: Thu Jun 20 2024 (06/20/2024, 12:39:00 UTC)
Source: CVE Database V5
Vendor/Project: Kiuwan
Product: SAST Local Analyzer

Description

The Kiuwan Local Analyzer (KLA) Java scanning application contains several hard-coded secrets in plain text format. In some cases, this can potentially compromise the confidentiality of the scan results. Several credentials were found in the JAR files of the Kiuwan Local Analyzer. The JAR file "lib.engine/insight/optimyth-insight.jar" contains the file "InsightServicesConfig.properties", which has the configuration tokens "insight.github.user" as well as "insight.github.password" prefilled with credentials. At least the specified username corresponds to a valid GitHub account. The JAR file "lib.engine/insight/optimyth-insight.jar" also contains the file "es/als/security/Encryptor.properties", in which the key used for encrypting the results of any performed scan. This issue affects Kiuwan SAST: <master.1808.p685.q13371

AI-Powered Analysis

AILast updated: 11/04/2025, 18:24:32 UTC

Technical Analysis

CVE-2023-49113 identifies a critical security flaw in the Kiuwan SAST Local Analyzer, a Java-based static application security testing tool. The vulnerability arises from the presence of hard-coded secrets stored in plaintext within the application’s JAR files. Specifically, the file "InsightServicesConfig.properties" inside "lib.engine/insight/optimyth-insight.jar" contains GitHub credentials (username and password), with the username confirmed as a valid GitHub account. Additionally, the file "Encryptor.properties" in the same JAR holds the encryption key used to secure scan results. Because these secrets are embedded in the application without encryption or obfuscation, an attacker with local access and limited privileges can extract them by inspecting the JAR contents. This exposure can lead to unauthorized access to the GitHub account, potentially enabling further attacks such as code tampering or information leakage. Moreover, possession of the encryption key compromises the confidentiality and integrity of scan results, allowing attackers to decrypt or manipulate sensitive data. The vulnerability affects all versions of Kiuwan SAST Local Analyzer prior to master.1808.p685.q13371. The CVSS v3.1 score of 7.8 reflects high severity due to the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no requirement for user interaction. No known exploits are currently reported in the wild, but the risk remains significant given the nature of the exposed secrets.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the security of their software development lifecycle. Kiuwan SAST is used to identify vulnerabilities in source code, and compromising its scan results can undermine trust in the security posture of applications under development. Exposure of GitHub credentials could lead to unauthorized repository access, enabling attackers to inject malicious code or exfiltrate intellectual property. The leakage of encryption keys further endangers the confidentiality and integrity of scan data, potentially allowing attackers to manipulate or disclose sensitive findings. This can result in delayed vulnerability remediation, increased risk of supply chain attacks, and regulatory compliance violations under frameworks such as GDPR. Organizations relying on Kiuwan SAST Local Analyzer for secure code analysis may face operational disruptions and reputational damage if this vulnerability is exploited.

Mitigation Recommendations

Organizations should immediately assess their use of Kiuwan SAST Local Analyzer and identify affected versions. Since no official patch links are currently provided, users should contact Kiuwan support for guidance and prioritize upgrading to versions beyond master.1808.p685.q13371 once available. In the interim, restrict local access to systems running the analyzer to trusted personnel only, and monitor for unauthorized access attempts. Remove or rotate any exposed GitHub credentials and encryption keys to prevent misuse. Implement secure secret management practices by externalizing credentials from application binaries and using environment variables or dedicated secret vaults. Conduct regular audits of development tools for embedded secrets and enforce secure coding practices to avoid hard-coded sensitive information. Additionally, review and tighten permissions on repositories and scan result storage to minimize potential damage from credential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2023-11-22T11:08:37.654Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5cff58c9332ff08e96

Added to database: 11/4/2025, 5:43:56 PM

Last enriched: 11/4/2025, 6:24:32 PM

Last updated: 11/5/2025, 12:35:19 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats