Permissions, Privileges, and Access Controls in Kubernetes Continuous Deploy - CVE-2022-27211
Published: March 16, 2022
Kubernetes Continuous Deploy
Jenkins
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to application does not properly impose security restrictions in an HTTP endpoint. A remote user can connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.