CVE-2023-35142
Java vulnerability analysis and mitigation

Overview

Jenkins Checkmarx Plugin 2022.4.3 and earlier contains a security vulnerability identified as CVE-2023-35142, which was disclosed on June 14, 2023. The vulnerability affects the SSL/TLS validation functionality for connections to the Checkmarx server, where the plugin disables the validation by default. This security issue impacts all versions of the Checkmarx Plugin up to and including version 2022.4.3 (Jenkins Advisory).

Technical details

The vulnerability is classified with a CVSS v3.1 Base Score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. The core issue lies in the plugin's default configuration which automatically disables SSL/TLS certificate validation for connections to the Checkmarx server. This misconfiguration is related to CWE-295 (Improper Certificate Validation) (NVD).

Impact

Unless explicitly changed by an administrator, the disabled SSL/TLS validation would cause all connections to the Checkmarx server to ignore certificate validation, potentially enabling man-in-the-middle attacks. This could allow attackers to intercept and manipulate communication between Jenkins and the Checkmarx server (Jenkins Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Checkmarx Plugin version 2023.2.6, which enables SSL/TLS validation by default. Administrators are advised to update to this version or later. For those who cannot update immediately, it is recommended to review their configuration and manually enable SSL/TLS validation for connections to the Checkmarx server (Jenkins Advisory).

Community reactions

The vulnerability was discovered and reported by Daniel Beck from CloudBees Inc., highlighting the ongoing security research efforts within the Jenkins community (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management