SB2019092712 - Privilege escalation in Kubernetes Pipeline - Kubernetes Steps plugin for Jenkins



SB2019092712 - Privilege escalation in Kubernetes Pipeline - Kubernetes Steps plugin for Jenkins

Published: September 27, 2019

Security Bulletin ID SB2019092712
Severity
High
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-10417)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to the affected software defines a custom whitelist for all scripts protected by the Script Security sandbox. This custom whitelist allows the use of methods that can be used to bypass Script Security sandbox protection. A remote authenticated attacker can execute arbitrary code on any Jenkins instance with this plugin installed.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.