Kubernetes Plugin 1.27.3 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
External References: https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2103
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2021:0038 https://access.redhat.com/errata/RHSA-2021:0038
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-2309
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.5 Via RHSA-2021:0034 https://access.redhat.com/errata/RHSA-2021:0034
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2021:0637 https://access.redhat.com/errata/RHSA-2021:0637