CVE-2020-2309

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

References

https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2103

Details

Source: MITRE

Published: 2020-11-04

Updated: 2020-11-06

Type: CWE-862

Risk Information

CVSS v2

Base Score: 4

Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 8

Severity: MEDIUM

CVSS v3

Base Score: 4.3

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Impact Score: 1.4

Exploitability Score: 2.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:jenkins:kubernetes:*:*:*:*:*:jenkins:*:* versions up to 1.27.3 (inclusive)

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
147013RHEL 7 : OpenShift Container Platform 3.11.394 bug fix and (RHSA-2021:0637)NessusRed Hat Local Security Checks
high
145089RHEL 7 : OpenShift Container Platform 4.5.27 packages and (RHSA-2021:0034)NessusRed Hat Local Security Checks
medium
145049RHEL 7 / 8 : OpenShift Container Platform 4.6.12 packages and (RHSA-2021:0038)NessusRed Hat Local Security Checks
medium