Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS13Zjc2LXFncXEtZ2Nmas4AAjkJ

RCE vulnerability in Google Kubernetes Engine Plugin

Google Kubernetes Engine Plugin 0.8.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution vulnerability exploitable by users able to provide YAML input files to Google Kubernetes Engine Plugin’s build step.

Google Kubernetes Engine Plugin 0.8.1 configures its YAML parser to only instantiate safe types.

Permalink: https://github.com/advisories/GHSA-wf76-qgqq-gcfj
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13Zjc2LXFncXEtZ2Nmas4AAjkJ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago


CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-wf76-qgqq-gcfj, CVE-2020-2121
References: Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:google-kubernetes-engine
Affected Version Ranges: < 0.8.1
Fixed in: 0.8.1