Remote Code Execution (RCE) Affecting com.elasticbox.jenkins-ci.plugins:kubernetes-ci package, versions [0,]


0.0
high

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 0.62% (79th percentile)
Expand this section
NVD
8.8 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-COMELASTICBOXJENKINSCIPLUGINS-575271
  • published 3 Jul 2020
  • disclosed 3 Jul 2020
  • credit Unknown

How to fix?

There is no fixed version for com.elasticbox.jenkins-ci.plugins:kubernetes-ci.

Overview

com.elasticbox.jenkins-ci.plugins:kubernetes-ci is a Kubernetes CI Plugin simplifies the integration of Kubernetes and Jenkins in order to provide an easy way to implement CI/CD scenarios based on Charts.

Affected versions of this package are vulnerable to Remote Code Execution (RCE). It does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to ElasticBox Jenkins Kubernetes CI/CD Plugin’s build step.