First published: Tue Mar 15 2022(Updated: )
A missing permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes Continuous Deploy | <=2.3.1 | |
Jenkins Kubernetes Continuous Deploy | <=2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-27209.
The title of this vulnerability is 'A missing permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows a…'
The description of this vulnerability is 'A missing permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.'
The affected software is Kubernetes Continuous Deploy Plugin version up to and including 2.3.1.
The severity of this vulnerability is medium with a CVSS score of 6.5.
You can find more information about this vulnerability in the following references: - [Openwall](http://www.openwall.com/lists/oss-security/2022/03/15/2) - [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2636)