Cross-Site Request Forgery in Jenkins Amazon EC2 Plugin
CVE-2020-2186
4.3MEDIUM
Summary
The Jenkins Amazon EC2 Plugin 1.50.1 and earlier versions are susceptible to a Cross-Site Request Forgery vulnerability, which can allow an attacker to manipulate provisioning calls. If a user with sufficient privileges is tricked into clicking on a malicious link, the attacker could leverage this vulnerability to provision EC2 instances without the user's consent. This can lead to unauthorized resource allocation and potential abuse of cloud services.
Affected Version(s)
Jenkins Amazon EC2 Plugin <= 1.50.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved