4
CVSSv2

CVE-2021-21661

Published: 10/06/2021 Updated: 25/10/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

Jenkins Kubernetes CLI Plugin 1.10.0 and previous versions does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins kubernetes

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Multiple vulnerabilities in Jenkins plugins <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Daniel Beck &lt;ml () ...

Github Repositories

CSEC302-Demo-Tommy CVE-2022-21661 WordPress SQL Injection Vulnerability It is common for WordPress plugins to be vulnerable, but what is so special about this vulnerability is that it is actually in WordPress itself Since this vulnerability is in WordPress, you will likely need to install xampp or some other Apache web server in order to run the php files and set up WordPress