First published: Wed Nov 04 2020(Updated: )
A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:3.11.1612862361-1.el7 | 2-plugins-0:3.11.1612862361-1.el7 |
redhat/jenkins | <2-plugins-0:4.5.1610108899-1.el7 | 2-plugins-0:4.5.1610108899-1.el7 |
redhat/jenkins | <2-plugins-0:4.6.1609853716-1.el8 | 2-plugins-0:4.6.1609853716-1.el8 |
Jenkins Kubernetes | <=1.27.3 | |
maven/org.csanchez.jenkins.plugins:kubernetes | <1.21.6 | 1.21.6 |
maven/org.csanchez.jenkins.plugins:kubernetes | >=1.22.0<1.25.4.1 | 1.25.4.1 |
maven/org.csanchez.jenkins.plugins:kubernetes | >=1.26.0<1.26.5 | 1.26.5 |
maven/org.csanchez.jenkins.plugins:kubernetes | >=1.27.1<1.27.4 | 1.27.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-2308 is a vulnerability in Jenkins Kubernetes Plugin 1.27.3 and earlier that allows attackers with Overall/Read permission to list global pod template names.
The severity of CVE-2020-2308 is medium with a severity value of 4.
To fix CVE-2020-2308, you should update Jenkins Kubernetes Plugin to version 1.27.4 or later.
You can find more information about CVE-2020-2308 at the following references: [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2102), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2021:0038), [Red Hat CVE-2020-2308](https://access.redhat.com/security/cve/cve-2020-2308).