First published: Thu Jun 10 2021(Updated: )
Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:kubernetes-cli | <1.10.1 | 1.10.1 |
Jenkins Kubernetes CI | <=1.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21661 has a medium severity rating due to the unauthorized enumeration of credential IDs.
To fix CVE-2021-21661, upgrade the Jenkins Kubernetes CLI Plugin to version 1.10.1 or later.
The impact of CVE-2021-21661 includes the risk of exposing sensitive credential IDs to unauthorized users with read permissions.
CVE-2021-21661 affects all versions of the Jenkins Kubernetes CLI Plugin up to and including 1.10.0.
Users with Overall/Read permission in Jenkins are at risk due to the lack of permission checks in the affected plugin.