Man-in-the-Middle Vulnerability in Jenkins Amazon EC2 Plugin by CloudBees
CVE-2020-2187
5.6MEDIUM
Summary
The Jenkins Amazon EC2 Plugin versions 1.50.1 and earlier are vulnerable due to the unconditioned acceptance of self-signed certificates and the absence of hostname validation. This vulnerability could allow attackers to execute man-in-the-middle (MITM) attacks, intercepting and manipulating data transmitted between the Jenkins server and the EC2 instances. It is crucial for users to ensure that only trusted certificates are used and that proper hostname validation is implemented to safeguard against unauthorized access and ensure secure communication.
Affected Version(s)
Jenkins Amazon EC2 Plugin <= 1.50.1
References
CVSS V3.1
Score:
5.6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved