Cross-Site Request Forgery in Jenkins Amazon EC2 Plugin
CVE-2020-2186

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
6 May 2020

Summary

The Jenkins Amazon EC2 Plugin 1.50.1 and earlier versions are susceptible to a Cross-Site Request Forgery vulnerability, which can allow an attacker to manipulate provisioning calls. If a user with sufficient privileges is tricked into clicking on a malicious link, the attacker could leverage this vulnerability to provision EC2 instances without the user's consent. This can lead to unauthorized resource allocation and potential abuse of cloud services.

Affected Version(s)

Jenkins Amazon EC2 Plugin <= 1.50.1

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.