Jenkins Google Kubernetes Engine Plugin 0.6.2 and earlier created a temporary file containing a temporary access token in the project workspace, where it could be accessed by users with Job/Read permission.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2019/07/31/1 | third party advisory mailing list |
https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345 | vendor advisory |