Arbitrary Method Invocation Vulnerability in Jenkins Kubernetes Plugin
CVE-2019-10418
9.9CRITICAL
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 25 September 2019
Summary
The Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin has a vulnerability that allows attackers to bypass the standard script security measures by invoking arbitrary methods. This flaw derives from a custom whitelist that fails to adequately restrict method calls, posing a significant security risk for Jenkins environments.
Affected Version(s)
Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin 1.6 and earlier
References
CVSS V3.1
Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved