Temporary File Exposure in Jenkins Google Kubernetes Engine Plugin
CVE-2019-10365
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 31 July 2019
What is CVE-2019-10365?
The Jenkins Google Kubernetes Engine Plugin versions 0.6.2 and earlier are susceptible to a file exposure vulnerability. When the plugin operates, it creates a temporary file that contains a sensitive access token within the project workspace. This file can potentially be accessed by users who possess Job/Read permissions, leading to unauthorized access to sensitive information within the environment. Proper configuration and restrictions are necessary to mitigate this risk and secure the Jenkins instance.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Google Kubernetes Engine Plugin 0.6.2 and earlier
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved