A missing permission check in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602 | vendor advisory |
http://www.openwall.com/lists/oss-security/2019/12/17/1 | third party advisory mailing list |