#VU21380 Permissions, Privileges, and Access Controls in Kubernetes Pipeline - Kubernetes Steps - CVE-2019-10417

 

#VU21380 Permissions, Privileges, and Access Controls in Kubernetes Pipeline - Kubernetes Steps - CVE-2019-10417

Published: September 27, 2019


Vulnerability identifier: #VU21380
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2019-10417
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Kubernetes Pipeline - Kubernetes Steps
Software vendor:
Jenkins

Description

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to the affected software defines a custom whitelist for all scripts protected by the Script Security sandbox. This custom whitelist allows the use of methods that can be used to bypass Script Security sandbox protection. A remote authenticated attacker can execute arbitrary code on any Jenkins instance with this plugin installed.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links