Vulnerability Details CVE-2019-16576
A missing permission check in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.4%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.0
Products affected by CVE-2019-16576
-
cpe:2.3:a:jenkins:alauda_kubernetes_support:2.0.0
-
cpe:2.3:a:jenkins:alauda_kubernetes_support:2.0.1
-
cpe:2.3:a:jenkins:alauda_kubernetes_support:2.1.1
-
cpe:2.3:a:jenkins:alauda_kubernetes_support:2.1.2
-
cpe:2.3:a:jenkins:alauda_kubernetes_support:2.2.0
-
cpe:2.3:a:jenkins:alauda_kubernetes_support:2.3.0