First published: Wed Jul 31 2019(Updated: )
Jenkins Google Kubernetes Engine Plugin 0.6.2 and earlier created a temporary file containing a temporary access token in the project workspace, where it could be accessed by users with Job/Read permission.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Kubernetes Engine | <=0.6.2 | |
maven/org.jenkins-ci.plugins:google-kubernetes-engine | <0.6.3 | 0.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10365 is a vulnerability in Jenkins Google Kubernetes Engine Plugin 0.6.2 and earlier that allows users with Job/Read permission to access a temporary file containing a temporary access token.
CVE-2019-10365 has a severity value of 4.3, which is considered medium.
CVE-2019-10365 occurs when the Jenkins Google Kubernetes Engine Plugin creates a temporary file named `.kube...config` containing a temporary access token in the project workspace, allowing users with Job/Read permission to access it.
Jenkins Google Kubernetes Engine Plugin versions up to and including 0.6.2 are affected by CVE-2019-10365.
To fix CVE-2019-10365, update your Jenkins Google Kubernetes Engine Plugin to version 0.6.3 or later.