Missing Permission Check in Jenkins Alauda Kubernetes Support Plugin
CVE-2019-16576
6.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 17 December 2019
Summary
A vulnerability in the Jenkins Alauda Kubernetes Support Plugin allows attackers with Overall/Read permission to exploit a missing permission check. This flaw enables attackers to connect to a malicious URL leveraging attacker-specified credential IDs. Consequently, sensitive information such as the Kubernetes service account token or other credentials stored in Jenkins may be compromised. Users are strongly advised to update to the latest version of the plugin to mitigate risks associated with this vulnerability.
Affected Version(s)
Jenkins Alauda Kubernetes Suport Plugin <= 2.3.0
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved