Incorrect Permission Checks in Jenkins Kubernetes Plugin by Jenkins
CVE-2020-2309
4.3MEDIUM
Summary
An incorrect permission check in the Jenkins Kubernetes Plugin allows users with Overall/Read permission to enumerate the IDs of credentials stored in Jenkins. This vulnerability can lead to unauthorized access to sensitive information, compromising the integrity of secured credentials. The affected versions include any prior to the plugin version 1.27.4, making it critical for users to update to the latest version to ensure their systems are secure. For more details, please refer to the Jenkins security advisory.
Affected Version(s)
Jenkins Kubernetes Plugin <= 1.27.3
Jenkins Kubernetes Plugin 1.26.5
Jenkins Kubernetes Plugin 1.25.4.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved