-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stems from two key patterns: 1) Missing permission checks in connection test methods (common in Jenkins form validation handlers) allow unauthorized API interactions. 2) Credential verification endpoints lack proper access controls. The advisory explicitly references form validation methods without permission checks (CWE-285) and credential ID enumeration (CVE-2019-10470). While exact implementation details aren't public, Jenkins plugin architecture patterns strongly suggest these methods would reside in DescriptorImpl classes handling form validation and credential verification.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.elasticbox.jenkins-ci.plugins:kubernetes-ci | maven | <= 1.3 |