First published: Wed Apr 12 2023(Updated: )
Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Kubernetes | <=3909.v1f2c633e8590 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30513 has been classified with a moderate severity level due to its potential exposure of sensitive credentials.
To fix CVE-2023-30513, upgrade the Jenkins Kubernetes Plugin to version 3910.v1f2c633e8591 or later.
CVE-2023-30513 affects Jenkins Kubernetes Plugin versions up to and including 3909.v1f2c633e8590.
The impact of CVE-2023-30513 is that sensitive credentials may be exposed in build logs, compromising security.
As a temporary workaround for CVE-2023-30513, consider disabling push mode for durable task logging until the plugin is updated.