Description
A missing permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
References
http://www.openwall.com/lists/oss-security/2022/03/15/2
Mailing ListThird Party Advisory
http://www.openwall.com/lists/oss-security/2022/03/15/2
Mailing ListThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2022-03-15T16:15:11.947Z
3 years agoLast modified
2024-11-21T05:55:25.127Z
1 year ago