Vulnerability Description
Jenkins Google Kubernetes Engine Plugin 0.6.2 and earlier created a temporary file containing a temporary access token in the project workspace, where it could be accessed by users with Job/Read permission.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kubernetes Engine | <= 0.6.2 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2019/07/31/1Mailing ListThird Party Advisory
- https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345Vendor Advisory
- http://www.openwall.com/lists/oss-security/2019/07/31/1Mailing ListThird Party Advisory
- https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345Vendor Advisory
FAQ
What is CVE-2019-10365?
CVE-2019-10365 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Jenkins Google Kubernetes Engine Plugin 0.6.2 and earlier created a temporary file containing a temporary access token in the project workspace, where it could be accessed by users with Job/Read permi...
How severe is CVE-2019-10365?
CVE-2019-10365 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10365?
Check the references section above for vendor advisories and patch information. Affected products include: Google Kubernetes Engine.