Remote Code Execution Vulnerability in Jenkins Kubernetes CI/CD Plugin by Jenkins
CVE-2020-2211
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 2 July 2020
Summary
The Jenkins Kubernetes CI/CD Plugin prior to version 1.4 contains a vulnerability where the YAML parser is inadequately configured, allowing for the instantiation of arbitrary types. This flaw may enable attackers to execute remote code, posing a significant risk to the security of Jenkins installations utilizing this plugin. Administrators are advised to update to the latest version to mitigate this risk.
Affected Version(s)
Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin <= 1.3
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved