CVE-2023-49113: CWE-312 Cleartext Storage of Sensitive Information in Kiuwan SAST Local Analyzer
The Kiuwan Local Analyzer (KLA) Java scanning application contains several hard-coded secrets in plain text format. In some cases, this can potentially compromise the confidentiality of the scan results. Several credentials were found in the JAR files of the Kiuwan Local Analyzer. The JAR file "lib.engine/insight/optimyth-insight.jar" contains the file "InsightServicesConfig.properties", which has the configuration tokens "insight.github.user" as well as "insight.github.password" prefilled with credentials. At least the specified username corresponds to a valid GitHub account. The JAR file "lib.engine/insight/optimyth-insight.jar" also contains the file "es/als/security/Encryptor.properties", in which the key used for encrypting the results of any performed scan. This issue affects Kiuwan SAST: <master.1808.p685.q13371
AI Analysis
Technical Summary
CVE-2023-49113 identifies a critical security flaw in the Kiuwan SAST Local Analyzer, a Java-based static application security testing tool. The vulnerability arises from the presence of hard-coded secrets stored in plaintext within the application’s JAR files. Specifically, the file "InsightServicesConfig.properties" inside "lib.engine/insight/optimyth-insight.jar" contains GitHub credentials (username and password), with the username confirmed as a valid GitHub account. Additionally, the file "Encryptor.properties" in the same JAR holds the encryption key used to secure scan results. Because these secrets are embedded in the application without encryption or obfuscation, an attacker with local access and limited privileges can extract them by inspecting the JAR contents. This exposure can lead to unauthorized access to the GitHub account, potentially enabling further attacks such as code tampering or information leakage. Moreover, possession of the encryption key compromises the confidentiality and integrity of scan results, allowing attackers to decrypt or manipulate sensitive data. The vulnerability affects all versions of Kiuwan SAST Local Analyzer prior to master.1808.p685.q13371. The CVSS v3.1 score of 7.8 reflects high severity due to the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no requirement for user interaction. No known exploits are currently reported in the wild, but the risk remains significant given the nature of the exposed secrets.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the security of their software development lifecycle. Kiuwan SAST is used to identify vulnerabilities in source code, and compromising its scan results can undermine trust in the security posture of applications under development. Exposure of GitHub credentials could lead to unauthorized repository access, enabling attackers to inject malicious code or exfiltrate intellectual property. The leakage of encryption keys further endangers the confidentiality and integrity of scan data, potentially allowing attackers to manipulate or disclose sensitive findings. This can result in delayed vulnerability remediation, increased risk of supply chain attacks, and regulatory compliance violations under frameworks such as GDPR. Organizations relying on Kiuwan SAST Local Analyzer for secure code analysis may face operational disruptions and reputational damage if this vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately assess their use of Kiuwan SAST Local Analyzer and identify affected versions. Since no official patch links are currently provided, users should contact Kiuwan support for guidance and prioritize upgrading to versions beyond master.1808.p685.q13371 once available. In the interim, restrict local access to systems running the analyzer to trusted personnel only, and monitor for unauthorized access attempts. Remove or rotate any exposed GitHub credentials and encryption keys to prevent misuse. Implement secure secret management practices by externalizing credentials from application binaries and using environment variables or dedicated secret vaults. Conduct regular audits of development tools for embedded secrets and enforce secure coding practices to avoid hard-coded sensitive information. Additionally, review and tighten permissions on repositories and scan result storage to minimize potential damage from credential compromise.
Affected Countries
Germany, France, United Kingdom, Spain, Italy, Netherlands, Sweden
CVE-2023-49113: CWE-312 Cleartext Storage of Sensitive Information in Kiuwan SAST Local Analyzer
Description
The Kiuwan Local Analyzer (KLA) Java scanning application contains several hard-coded secrets in plain text format. In some cases, this can potentially compromise the confidentiality of the scan results. Several credentials were found in the JAR files of the Kiuwan Local Analyzer. The JAR file "lib.engine/insight/optimyth-insight.jar" contains the file "InsightServicesConfig.properties", which has the configuration tokens "insight.github.user" as well as "insight.github.password" prefilled with credentials. At least the specified username corresponds to a valid GitHub account. The JAR file "lib.engine/insight/optimyth-insight.jar" also contains the file "es/als/security/Encryptor.properties", in which the key used for encrypting the results of any performed scan. This issue affects Kiuwan SAST: <master.1808.p685.q13371
AI-Powered Analysis
Technical Analysis
CVE-2023-49113 identifies a critical security flaw in the Kiuwan SAST Local Analyzer, a Java-based static application security testing tool. The vulnerability arises from the presence of hard-coded secrets stored in plaintext within the application’s JAR files. Specifically, the file "InsightServicesConfig.properties" inside "lib.engine/insight/optimyth-insight.jar" contains GitHub credentials (username and password), with the username confirmed as a valid GitHub account. Additionally, the file "Encryptor.properties" in the same JAR holds the encryption key used to secure scan results. Because these secrets are embedded in the application without encryption or obfuscation, an attacker with local access and limited privileges can extract them by inspecting the JAR contents. This exposure can lead to unauthorized access to the GitHub account, potentially enabling further attacks such as code tampering or information leakage. Moreover, possession of the encryption key compromises the confidentiality and integrity of scan results, allowing attackers to decrypt or manipulate sensitive data. The vulnerability affects all versions of Kiuwan SAST Local Analyzer prior to master.1808.p685.q13371. The CVSS v3.1 score of 7.8 reflects high severity due to the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no requirement for user interaction. No known exploits are currently reported in the wild, but the risk remains significant given the nature of the exposed secrets.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the security of their software development lifecycle. Kiuwan SAST is used to identify vulnerabilities in source code, and compromising its scan results can undermine trust in the security posture of applications under development. Exposure of GitHub credentials could lead to unauthorized repository access, enabling attackers to inject malicious code or exfiltrate intellectual property. The leakage of encryption keys further endangers the confidentiality and integrity of scan data, potentially allowing attackers to manipulate or disclose sensitive findings. This can result in delayed vulnerability remediation, increased risk of supply chain attacks, and regulatory compliance violations under frameworks such as GDPR. Organizations relying on Kiuwan SAST Local Analyzer for secure code analysis may face operational disruptions and reputational damage if this vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately assess their use of Kiuwan SAST Local Analyzer and identify affected versions. Since no official patch links are currently provided, users should contact Kiuwan support for guidance and prioritize upgrading to versions beyond master.1808.p685.q13371 once available. In the interim, restrict local access to systems running the analyzer to trusted personnel only, and monitor for unauthorized access attempts. Remove or rotate any exposed GitHub credentials and encryption keys to prevent misuse. Implement secure secret management practices by externalizing credentials from application binaries and using environment variables or dedicated secret vaults. Conduct regular audits of development tools for embedded secrets and enforce secure coding practices to avoid hard-coded sensitive information. Additionally, review and tighten permissions on repositories and scan result storage to minimize potential damage from credential compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2023-11-22T11:08:37.654Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a3b5cff58c9332ff08e96
Added to database: 11/4/2025, 5:43:56 PM
Last enriched: 11/4/2025, 6:24:32 PM
Last updated: 11/5/2025, 12:35:19 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.