Credential Exposure in Jenkins Kubernetes Plugin by Jenkins
CVE-2023-30513

7.5HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 April 2023

Summary

A security flaw in the Jenkins Kubernetes Plugin allows sensitive credentials to be revealed in build logs when durable task logging is activated. Specifically, versions up to 3909.v1f2c633e8590 fail to adequately mask sensitive data, leading to potential information leaks. This vulnerability could expose critical credentials used in Jenkins builds, prompting the need for immediate security measures.

Affected Version(s)

Jenkins Kubernetes Plugin 3910.ve59cec5e33ea_

Jenkins Kubernetes Plugin 3910.ve59cec5e33ea_

Jenkins Kubernetes Plugin 3670.3672.v0ec52a_286336 < 3670.*

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.