Remote Code Execution Vulnerability in Jenkins Kubernetes CI/CD Plugin by Jenkins
CVE-2020-2211

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
2 July 2020

Summary

The Jenkins Kubernetes CI/CD Plugin prior to version 1.4 contains a vulnerability where the YAML parser is inadequately configured, allowing for the instantiation of arbitrary types. This flaw may enable attackers to execute remote code, posing a significant risk to the security of Jenkins installations utilizing this plugin. Administrators are advised to update to the latest version to mitigate this risk.

Affected Version(s)

Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin <= 1.3

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.