Jenkins JX Resources Plugin Allows Improper Connection to Kubernetes Server
CVE-2019-10339
8.8HIGH
Summary
In the Jenkins JX Resources Plugin, a vulnerability exists due to a missing permission check in the GlobalPluginConfiguration#doValidateClient method. This flaw permits users with Overall/Read access to initiate connections to a Kubernetes server specified by an attacker, potentially leading to the unintended exposure of sensitive credentials. This vulnerability underscores the importance of implementing stringent access controls in plugin configurations to prevent unauthorized access and data breaches.
Affected Version(s)
Jenkins JX Resources Plugin 1.0.36 and earlier
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved