First published: Wed Oct 16 2019(Updated: )
A missing permission check in Jenkins Google Kubernetes Engine Plugin 0.7.0 and earlier allowed attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Google Kubernetes Engine | <=0.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-10445 is classified as medium as it allows unauthorized information exposure about credentials.
To fix CVE-2019-10445, upgrade the Jenkins Google Kubernetes Engine Plugin to version 0.8.0 or later.
CVE-2019-10445 affects users of Jenkins Google Kubernetes Engine Plugin 0.7.0 and earlier versions.
CVE-2019-10445 can be exploited by attackers with Overall/Read permission to gain limited information about credential scopes.
The potential impacts of CVE-2019-10445 include unauthorized information disclosure regarding credential IDs.