Missing Permission Check in Jenkins Kubernetes Continuous Deploy Plugin Exposes Sensitive Data
CVE-2022-27209

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
15 March 2022

Summary

A vulnerability exists in the Kubernetes Continuous Deploy Plugin for Jenkins whereby a missing permission check allows users with Overall/Read permissions to enumerate sensitive credential IDs stored in Jenkins. This poses a significant risk as attackers may exploit this weakness to gain insights into user credentials, potentially leading to unauthorized access and further exploitation. It is crucial for Jenkins administrators to update to the latest version of the plugin to mitigate this risk and bolster the security of their CI/CD pipeline.

Affected Version(s)

Jenkins Kubernetes Continuous Deploy Plugin <= 2.3.1

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.