First published: Tue Jan 24 2023(Updated: )
Jenkins Kubernetes Credentials Provider Plugin 1.208.v128ee9800c04 and earlier does not set the appropriate context for Kubernetes credentials lookup, allowing attackers with Item/Configure permission to access and potentially capture Kubernetes credentials they are not entitled to.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=1.208.v128ee9800c04 | ||
Jenkins Kubernetes Credentials Provider | <=1.208.v128ee9800c04 | |
maven/com.cloudbees.jenkins.plugins:kubernetes-credentials-provider | <1.209.v862c6e5fb | 1.209.v862c6e5fb |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24425 has a moderate severity level as it allows unauthorized access to Kubernetes credentials.
You can fix CVE-2023-24425 by updating the Jenkins Kubernetes Credentials Provider Plugin to version 1.209.v862c6e5fb or later.
CVE-2023-24425 affects users of Jenkins Kubernetes Credentials Provider Plugin versions 1.208.v128ee9800c04 and earlier.
An attacker needs Item/Configure permission to exploit CVE-2023-24425 and access sensitive Kubernetes credentials.
CVE-2023-24425 allows unauthorized access to Kubernetes credentials configured within Jenkins.